The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59836

CVE-2025-59836: Siderolabs Omni DoS Vulnerability

CVE-2025-59836 is a denial of service vulnerability in Siderolabs Omni caused by a nil pointer dereference that allows unauthenticated attackers to crash the server. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 29, 2026

CVE-2025-59836 Overview

CVE-2025-59836 is a Null Pointer Dereference vulnerability in Siderolabs Omni, a Kubernetes management platform for bare metal, virtual machines, and cloud environments. The vulnerability exists in the Omni Resource Service and allows unauthenticated attackers to cause a server panic and denial of service by sending crafted API requests with empty metadata fields.

The flaw resides in the isSensitiveSpec function which invokes grpcomni.CreateResource without performing proper validation to check if the resource's metadata field is nil. When an attacker creates a resource with an empty Metadata field, the CreateResource function attempts to dereference resource.Metadata.Version, triggering a segmentation fault and crashing the server.

Critical Impact

Unauthenticated attackers can remotely crash Omni servers managing Kubernetes clusters, causing service disruption across bare metal, VM, and cloud deployments without requiring any credentials.

Affected Products

  • Siderolabs Omni versions prior to 1.1.5
  • Siderolabs Omni versions prior to 1.0.2
  • All Omni deployments using the vulnerable gRPC API endpoints

Discovery Timeline

  • October 13, 2025 - CVE-2025-59836 published to NVD
  • December 4, 2025 - Last updated in NVD database

Technical Details for CVE-2025-59836

Vulnerability Analysis

This vulnerability (CWE-476: NULL Pointer Dereference) occurs due to insufficient input validation in the Omni Resource Service's gRPC API layer. The isSensitiveSpec function processes resource creation and update requests without validating that required metadata structures are present before accessing their properties.

When the server receives a request to create or update a resource, it passes the request to grpcomni.CreateResource. This function expects the resource object to contain a properly initialized Metadata field with a Version property. However, if an attacker sends a request with an empty or nil Metadata field, the code attempts to access resource.Metadata.Version on a nil pointer, causing an immediate segmentation fault.

The vulnerability is particularly dangerous because it can be triggered by unauthenticated users, requiring no prior authentication or authorization to exploit. This allows any network-accessible attacker to repeatedly crash the Omni server, effectively denying service to legitimate Kubernetes management operations.

Root Cause

The root cause is missing nil pointer validation in the gRPC interceptor chain before processing resource creation and update operations. The isSensitiveSpec function and underlying CreateResource implementation assume that incoming request objects will always contain properly structured metadata, violating the principle of defensive programming.

The fix involved updating the go-api-signature dependency to version 0.3.8, which includes proper validation logic in the gRPC interceptor chain to reject requests with nil or empty metadata fields before they can trigger the null pointer dereference.

Attack Vector

The attack can be executed remotely over the network without authentication. An attacker simply needs to:

  1. Identify an exposed Omni API endpoint
  2. Craft a gRPC request to the resource creation or update endpoints
  3. Include an empty or nil Metadata field in the request payload
  4. Send the request to trigger the server crash

The following patch was applied to fix the vulnerability by updating the go-api-signature dependency:

text
 	github.com/siderolabs/discovery-client v0.1.13
 	github.com/siderolabs/discovery-service v1.0.11
 	github.com/siderolabs/gen v0.8.5
-	github.com/siderolabs/go-api-signature v0.3.7
+	github.com/siderolabs/go-api-signature v0.3.8
 	github.com/siderolabs/go-circular v0.2.3
 	github.com/siderolabs/go-debug v0.6.0
 	github.com/siderolabs/go-kubernetes v0.2.25

Source: GitHub Commit 1396083f

Detection Methods for CVE-2025-59836

Indicators of Compromise

  • Unexpected Omni server crashes or restarts with segmentation fault errors in logs
  • gRPC API requests to resource creation/update endpoints containing empty or missing Metadata fields
  • Repeated connection attempts to Omni API endpoints followed by server process terminations
  • Kubernetes management operations failing due to Omni service unavailability

Detection Strategies

  • Monitor Omni server logs for panic messages containing "nil pointer dereference" or "invalid memory address"
  • Implement gRPC request inspection to identify malformed requests with empty metadata structures
  • Configure alerting on Omni service restarts or crashes occurring in short succession
  • Deploy network-level monitoring to detect suspicious traffic patterns to Omni API ports

Monitoring Recommendations

  • Enable verbose logging on Omni servers to capture gRPC request details before crashes
  • Implement health checks to detect and alert on Omni service availability issues
  • Monitor process crash dumps for signatures matching nil pointer dereference in resource handling code
  • Track API request patterns for anomalous empty or malformed payloads

How to Mitigate CVE-2025-59836

Immediate Actions Required

  • Upgrade Siderolabs Omni to version 1.1.5 or 1.0.2 immediately
  • Restrict network access to Omni API endpoints to trusted networks only
  • Implement rate limiting on gRPC API endpoints to reduce impact of potential exploitation
  • Review logs for evidence of exploitation attempts before patching

Patch Information

Siderolabs has released patched versions that address this vulnerability by fixing the order in the gRPC interceptor chain and updating the go-api-signature dependency to version 0.3.8. The fix ensures proper validation of request metadata before processing.

Patched versions:

  • Omni version 1.1.5 for the 1.1.x branch
  • Omni version 1.0.2 for the 1.0.x branch

For detailed patch information, refer to the GitHub Security Advisory GHSA-4p3p-cr38-v5xp.

Workarounds

  • Deploy a reverse proxy or API gateway in front of Omni to validate request structure before forwarding
  • Implement network segmentation to limit access to Omni API endpoints to authorized clients only
  • Use firewall rules to restrict inbound connections to the Omni gRPC port from untrusted networks
  • Consider temporary service isolation until patches can be applied in production environments
bash
# Example: Restrict access to Omni API port using iptables
iptables -A INPUT -p tcp --dport 8080 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j DROP

# Verify Omni version after upgrade
omnictl version
# Expected output should show 1.1.5 or 1.0.2

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechSiderolabs Omni

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.55%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Commit Update

  • GitHub Security Advisory GHSA-4p3p-cr38-v5xp
  • Related CVEs
  • CVE-2025-61688: Siderolabs Omni Information Disclosure
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English