CVE-2023-22648
Rancher vulnerability analysis and mitigation

Overview

A privilege management vulnerability (CVE-2023-22648) was discovered in SUSE Rancher that affects versions from 2.6.7 before 2.6.13 and from 2.7.0 before 2.7.4. The vulnerability specifically impacts Rancher instances with Azure AD integration enabled, where permission changes in Azure AD are not reflected for users during active sessions. This vulnerability was disclosed on June 1, 2023, and has been assigned a CVSS v3.1 base score of 8.0 (High) (NVD, GitHub Advisory).

Technical details

The vulnerability stems from an improper privilege management mechanism that affects users accessing Rancher through various methods including the Rancher UI, kubectl with downloaded kubeconfig, and tokens created via the Rancher UI Create API Key feature. The issue persists even after Rancher Manager pod restarts, with permissions remaining cached. The vulnerability has been assigned a CVSS v3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impact on confidentiality, integrity, and availability (GitHub Advisory).

Impact

The vulnerability allows users to retain their previous permissions in Rancher even after their privileges have been reduced or revoked in Azure AD. This means users could maintain access to Rancher resources even after being removed from privileged groups in Azure AD, potentially leading to unauthorized access to sensitive resources. The only way for updated permissions to take effect is for users to log out and log back in (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Rancher versions 2.6.13 and 2.7.4. There are no direct mitigation strategies available besides updating to a patched version. Organizations using affected versions should upgrade to the patched versions as soon as possible (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rancher vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2020-10676HIGH8.8
  • RancherRancher
  • rancher
NoYesDec 12, 2023
CVE-2023-22648HIGH8.8
  • RancherRancher
  • rancher
NoYesJun 01, 2023
CVE-2023-22649HIGH8.4
  • RancherRancher
  • rancher
NoYesOct 16, 2024
CVE-2022-43760HIGH8.4
  • RancherRancher
  • rancher
NoYesJun 01, 2023
CVE-2023-22647HIGH8
  • RancherRancher
  • github.com/rancher/rancher
NoYesJun 01, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management