Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58267: CWE-345: Insufficient Verification of Data Authenticity in SUSE rancher

0
High
VulnerabilityCVE-2024-58267cvecve-2024-58267cwe-345
Published: Thu Oct 02 2025 (10/02/2025, 12:08:30 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: rancher

Description

A vulnerability has been identified within Rancher Manager whereby the SAML authentication from the Rancher CLI tool is vulnerable to phishing attacks. The custom authentication protocol for SAML-based providers can be abused to steal Rancher’s authentication tokens.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:03:01 UTC

Technical Analysis

CVE-2024-58267 is a vulnerability identified in SUSE Rancher Manager, specifically affecting the SAML authentication process used by the Rancher CLI tool. Rancher is a widely used container management platform that facilitates Kubernetes cluster management. The vulnerability arises from insufficient verification of data authenticity (CWE-345) in the custom SAML authentication protocol implemented by Rancher. This flaw allows attackers to conduct phishing attacks that can trick users into revealing or allowing the theft of Rancher authentication tokens. These tokens are critical for authenticating users and granting access to Rancher-managed clusters and resources. The vulnerability affects Rancher versions 2.9.0 through 2.12.0. The CVSS v3.1 score is 8.0 (high severity), reflecting network attack vector, high impact on confidentiality, integrity, and availability, but requiring low privileges and user interaction. Exploitation could lead to unauthorized access, manipulation, or disruption of Kubernetes clusters managed by Rancher. No patches or known exploits are currently reported, but the vulnerability's nature demands urgent attention due to the sensitive nature of the tokens and the critical infrastructure Rancher manages.

Potential Impact

The potential impact of CVE-2024-58267 is significant for organizations relying on Rancher for Kubernetes cluster management. Successful exploitation can lead to theft of authentication tokens, enabling attackers to impersonate legitimate users and gain unauthorized access to Rancher environments. This can result in full compromise of cluster confidentiality, integrity, and availability, including unauthorized deployment or deletion of workloads, data exfiltration, and disruption of services. Given Rancher's role in managing containerized applications and infrastructure, such a breach could cascade into broader operational and security failures. The requirement for user interaction and low privileges lowers the barrier for attackers, especially in environments where phishing defenses are weak. The absence of known exploits in the wild suggests a window for proactive mitigation, but the high impact necessitates immediate action to prevent potential targeted attacks.

Mitigation Recommendations

To mitigate CVE-2024-58267, organizations should prioritize upgrading Rancher to versions beyond 2.12.0 once patches are released by SUSE. Until patches are available, implement the following specific measures: 1) Enforce strict user training and awareness programs focused on phishing recognition, especially targeting users of the Rancher CLI tool. 2) Restrict Rancher CLI usage to trusted networks and devices with enhanced endpoint security controls. 3) Employ multi-factor authentication (MFA) for Rancher access to reduce the risk of token misuse. 4) Monitor Rancher authentication logs for unusual token usage patterns or access anomalies. 5) Limit the scope and permissions of tokens issued via SAML to minimize potential damage if compromised. 6) Consider deploying network-level protections such as web proxies or gateways that can detect and block phishing attempts targeting Rancher users. 7) Regularly audit and rotate authentication tokens and credentials associated with Rancher. These targeted mitigations go beyond generic advice by focusing on the specific attack vector and token protection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-09-04T04:04:22.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3bfb66c7f7acdd3cbec

Added to database: 10/4/2025, 10:15:27 AM

Last enriched: 2/26/2026, 10:03:01 PM

Last updated: 3/26/2026, 8:18:39 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses