
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2024-22036) has been identified in Rancher with a CVSS score of 9.1. The vulnerability allows attackers to escape the chroot jail and gain root access to the Rancher container itself through compromised cluster or node drivers. This security flaw affects Rancher versions 2.7.0 before 2.7.16, 2.8.0 before 2.8.9, and 2.9.0 before 2.9.3 (GHSA Advisory, NVD).
The vulnerability stems from multiple security weaknesses in Rancher's implementation. During startup, Rancher appends /opt/drivers/management-state/bin to the PATH environment variable. Critical binaries like /usr/bin/rancher-machine, /usr/bin/helm_v3, and /usr/bin/kustomize are assigned UID 1001 and GID 127 instead of root ownership. Additionally, the drivers are executed with excessive permissions, and there's a lack of validation on driver file types, allowing symbolic links to be used (GHSA Advisory, Security Online).
In production environments, successful exploitation can lead to further privilege escalation within the Rancher container itself. For test and development environments using privileged Docker containers, attackers can potentially escape the Docker container entirely and gain execution access on the host system, compromising the entire infrastructure (GHSA Advisory, SOCRadar).
SUSE has released patches in Rancher versions 2.7.16, 2.8.9, and 2.9.3 to address this vulnerability. For those unable to upgrade immediately, key workarounds include limiting driver execution to trusted sources only and restricting admin privileges to trusted users for both Admins and Restricted Admins (GHSA Advisory, Security Online).
The security community has actively discussed this vulnerability on social media platforms, with security researchers emphasizing the critical nature of the vulnerability and urging organizations to apply patches immediately. The vulnerability has garnered significant attention due to its high severity score and potential impact on production environments (SOCRadar).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."