Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-32199: CWE-281: Improper Preservation of Permissions in SUSE rancher

0
Medium
VulnerabilityCVE-2023-32199cvecve-2023-32199cwe-281
Published: Wed Oct 29 2025 (10/29/2025, 14:54:04 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: rancher

Description

A vulnerability has been identified within Rancher Manager, where after removing a custom GlobalRole that gives administrative access or the corresponding binding, the user still retains access to clusters. This only affects custom Global Roles that have a * on * in * rule for resources or have a * on * rule for non-resource URLs

AI-Powered Analysis

AILast updated: 10/29/2025, 15:16:53 UTC

Technical Analysis

CVE-2023-32199 identifies a vulnerability in SUSE Rancher Manager related to improper permission handling, specifically improper preservation of permissions after removal of custom GlobalRoles. Rancher Manager uses GlobalRoles to define administrative access scopes across Kubernetes clusters. The vulnerability arises when a custom GlobalRole that grants administrative privileges—particularly those with wildcard '*' rules on resources or non-resource URLs—is deleted or its binding removed. Despite this removal, affected users retain cluster access, indicating that the system fails to revoke permissions correctly. This is categorized under CWE-281, which concerns improper preservation of permissions. The CVSS 3.1 score is 4.3 (medium severity), with attack vector network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) and user interaction (UI:R). The impact includes limited confidentiality, integrity, and availability loss due to lingering elevated access. No public exploits are currently known, and no patches have been linked yet. This vulnerability affects Rancher versions identified as '0' in the data, likely meaning initial or unspecified versions, so organizations should verify their specific versions. The flaw could allow an attacker or insider with previously assigned roles to maintain unauthorized cluster control even after role revocation, undermining access control policies and potentially enabling unauthorized configuration changes or data exposure within Kubernetes clusters managed by Rancher.

Potential Impact

For European organizations, the impact of CVE-2023-32199 can be significant, especially those relying on SUSE Rancher for Kubernetes cluster management. Persistent unauthorized access after role removal undermines trust in access control mechanisms, potentially allowing former administrators or compromised accounts to maintain control over critical infrastructure. This can lead to unauthorized deployment or modification of workloads, data leakage, or disruption of services. Given the widespread adoption of Kubernetes and Rancher in cloud-native environments across Europe, sectors such as finance, healthcare, telecommunications, and government could face risks of operational disruption and data breaches. The medium CVSS score reflects limited but meaningful confidentiality, integrity, and availability impacts. The requirement for high privileges and user interaction reduces the likelihood of remote exploitation by external attackers but raises concerns about insider threats or compromised privileged accounts. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.

Mitigation Recommendations

Until an official patch is released, European organizations should implement specific mitigations to reduce risk from CVE-2023-32199: 1) Conduct a thorough audit of all custom GlobalRoles in Rancher, focusing on those with wildcard '*' permissions on resources or non-resource URLs. 2) Avoid using overly permissive wildcard rules in GlobalRoles; instead, apply the principle of least privilege by defining explicit and minimal permissions. 3) After removing or modifying GlobalRoles, manually verify that associated user access to clusters has been revoked by testing access or reviewing audit logs. 4) Implement strict monitoring and alerting on Rancher access logs to detect any anomalous or unauthorized cluster access, especially from users whose roles have been revoked. 5) Enforce multi-factor authentication (MFA) and strong credential hygiene for all users with administrative privileges to reduce risk of account compromise. 6) Limit the number of users with high privilege roles and regularly review role assignments. 7) Stay informed on SUSE Rancher security advisories and apply patches promptly once available. 8) Consider network segmentation and additional Kubernetes RBAC controls to limit the blast radius of any unauthorized access. These steps go beyond generic advice by focusing on role auditing, permission minimization, and active verification of access revocation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2023-05-04T08:30:59.323Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69022c4683bae5e8566219ce

Added to database: 10/29/2025, 3:01:26 PM

Last enriched: 10/29/2025, 3:16:53 PM

Last updated: 10/30/2025, 11:07:28 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats