Changeflow GovPing Data Privacy & Cybersecurity Multiple Vulnerabilities in VMware Tanzu MySQL ...
Priority review Notice Added Final

Multiple Vulnerabilities in VMware Tanzu MySQL Kubernetes

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published April 3rd, 2026
Detected April 3rd, 2026
Email

Summary

CERT-FR issued a security advisory reporting multiple vulnerabilities in VMware Tanzu MySQL for Kubernetes affecting versions prior to 2.0.2. Ten CVEs are referenced including CVE-2025-14831, CVE-2025-15281, CVE-2025-15366, CVE-2025-15367, CVE-2025-9820, CVE-2026-0861, CVE-2026-0865, CVE-2026-0915, CVE-2026-1299, and CVE-2026-4111. Organizations using affected versions should apply the vendor-provided patches.

What changed

CERT-FR published advisory CERTFR-2026-AVI-0394 disclosing ten vulnerabilities in VMware Tanzu MySQL for Kubernetes. The vulnerabilities affect versions prior to 2.0.2, and the specific impacts are not specified by the vendor. The CVEs span from 2025 to 2026, with sources citing VMware Security Bulletin 37340 dated April 2, 2026.\n\nOrganizations running Tanzu MySQL on Kubernetes must identify their current version and upgrade to version 2.0.2 or later. No specific compliance deadline or penalty structure is stated; however, as this is a security vulnerability advisory, affected parties should treat the vendor patch as urgent. Operators should monitor the VMware support portal for the latest security patches and apply them according to their internal change management procedures.

What to do next

  1. Identify all Tanzu MySQL deployments on Kubernetes and verify current version numbers
  2. Upgrade Tanzu MySQL to version 2.0.2 or later to address the vulnerabilities
  3. Monitor the VMware security bulletin for any additional updates or patches

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 03 avril 2026 N° CERTFR-2026-AVI-0394 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans VMware Tanzu

Gestion du document

| Référence | CERTFR-2026-AVI-0394 |
| Titre | Multiples vulnérabilités dans VMware Tanzu |
| Date de la première version | 03 avril 2026 |
| Date de la dernière version | 03 avril 2026 |
| Source(s) | Bulletin de sécurité VMware 37340 du 02 avril 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risque

  • Non spécifié par l'éditeur

Systèmes affectés

  • Tanzu pour MySQL versions antérieures à 2.0.2 sur Kubernetes

Résumé

De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 03 avril 2026 Version initiale

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
April 3rd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
CERTFR-2026-AVI-0394

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Software patching Security vulnerability management
Threshold
Tanzu pour MySQL versions prior to 2.0.2 on Kubernetes
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
Cybersecurity
Topics
Software Security Vulnerability Disclosure

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.