CVE-2023-22649
Rancher vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2023-22649) has been identified in Rancher's audit logging system that could lead to sensitive data being leaked into audit logs. The vulnerability affects Rancher versions 2.6.0-2.6.14, 2.7.0-2.7.10, and 2.8.0-2.8.2. This is an opt-in feature that only impacts deployments with audit logging enabled and AUDIT_LEVEL set to 1 or above (GitHub Advisory).

Technical details

The vulnerability allows sensitive information to be exposed in audit logs during specific actions such as creating cloud credentials, setting up authentication providers, downloading kubeconfig files, and during login/logout operations. The leaked data may include HTTP headers, authentication credentials, API tokens, certificates, private keys, and raw command lines used by agents. The CVSS v3.1 score is 7.8 (High), with the attack vector being Local, requiring High privileges and User interaction (GitHub Advisory).

Impact

The severity of the vulnerability depends on the logging strategy implemented. For default configurations with local logging, the impact is contained within the system. However, when logs are shipped to external endpoints, the severity increases as security depends on the external log collector's security measures. The vulnerability can expose sensitive credentials, potentially leading to unauthorized access to cloud services, authentication systems, and Kubernetes clusters (GitHub Advisory).

Mitigation and workarounds

Organizations can mitigate this vulnerability by updating to the patched versions (2.6.14, 2.7.10, or 2.8.2). If updating is not immediately possible, organizations can either disable the Audit feature or decrease the audit level to 0. For deployments requiring AUDIT_LEVEL 1 or above, ensure proper log handling and avoid sharing logs with unauthorized users or shipping them to log ingestion solutions without appropriate RBAC enforcement. It is recommended to rotate static secrets after patching the system (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rancher vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2020-10676HIGH8.8
  • RancherRancher
  • github.com/rancher/rancher
NoYesDec 12, 2023
CVE-2023-22648HIGH8.8
  • RancherRancher
  • rancher
NoYesJun 01, 2023
CVE-2023-22649HIGH8.4
  • RancherRancher
  • rancher
NoYesOct 16, 2024
CVE-2022-43760HIGH8.4
  • RancherRancher
  • rancher
NoYesJun 01, 2023
CVE-2023-22647HIGH8
  • RancherRancher
  • rancher
NoYesJun 01, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management