Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58267: CWE-345: Insufficient Verification of Data Authenticity in SUSE rancher

0
High
VulnerabilityCVE-2024-58267cvecve-2024-58267cwe-345
Published: Thu Oct 02 2025 (10/02/2025, 12:08:30 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: rancher

Description

A vulnerability has been identified within Rancher Manager whereby the SAML authentication from the Rancher CLI tool is vulnerable to phishing attacks. The custom authentication protocol for SAML-based providers can be abused to steal Rancher’s authentication tokens.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:46:07 UTC

Technical Analysis

CVE-2024-58267 is a high-severity vulnerability affecting SUSE's Rancher Manager versions 2.9.0 through 2.12.0. The flaw lies in the custom SAML authentication protocol used by the Rancher CLI tool, which is designed to integrate with SAML-based identity providers for user authentication. Specifically, the vulnerability is classified under CWE-345, indicating insufficient verification of data authenticity. This weakness allows attackers to exploit the SAML authentication flow via phishing attacks to steal Rancher's authentication tokens. These tokens are critical as they grant access to Rancher Manager, a widely used container management platform that orchestrates Kubernetes clusters. The CVSS 3.1 base score of 8.0 reflects a high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), user interaction required (UI:R), scope changed (S:C), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability enables attackers to impersonate legitimate users or escalate privileges by capturing and reusing authentication tokens, potentially leading to full compromise of container orchestration environments managed by Rancher. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a significant risk, especially in environments where Rancher is used to manage critical infrastructure or sensitive workloads. The lack of available patches at the time of publication underscores the urgency for organizations to implement interim mitigations and closely monitor for suspicious activity related to SAML authentication flows.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Rancher is commonly deployed in enterprises and service providers that rely on Kubernetes for container orchestration, including sectors such as finance, healthcare, manufacturing, and government. Successful exploitation could lead to unauthorized access to container management interfaces, enabling attackers to manipulate workloads, exfiltrate sensitive data, disrupt services, or deploy malicious containers. Given the high confidentiality, integrity, and availability impacts, organizations could face operational downtime, data breaches, and compliance violations under regulations like GDPR. The phishing vector also increases risk as attackers may target employees with access to Rancher CLI tools, potentially bypassing traditional network defenses. Moreover, the scope change in the CVSS vector indicates that exploitation could affect resources beyond the initially compromised component, amplifying the threat. This vulnerability could also undermine trust in cloud-native deployments and complicate incident response efforts due to token theft and misuse.

Mitigation Recommendations

Beyond generic advice, European organizations should take the following specific steps: 1) Immediately audit and restrict access to Rancher CLI tools, ensuring only essential personnel have access. 2) Implement strict monitoring and alerting on SAML authentication attempts, focusing on anomalies such as repeated failures or unusual token requests. 3) Enforce multi-factor authentication (MFA) on identity providers integrated with Rancher to reduce the effectiveness of phishing attacks. 4) Educate users on phishing risks specifically targeting Rancher CLI and SAML workflows. 5) Temporarily disable or limit the use of the vulnerable SAML authentication method in Rancher CLI if feasible, or switch to alternative authentication mechanisms until patches are available. 6) Employ network segmentation to isolate Rancher management interfaces and limit exposure. 7) Regularly review and revoke any suspicious or stale authentication tokens. 8) Stay updated with SUSE advisories for patch releases and apply them promptly once available. 9) Conduct penetration testing focused on SAML authentication flows to identify potential exploitation paths. These targeted actions will help mitigate the risk while awaiting official patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-09-04T04:04:22.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3bfb66c7f7acdd3cbec

Added to database: 10/4/2025, 10:15:27 AM

Last enriched: 10/4/2025, 10:46:07 AM

Last updated: 10/7/2025, 11:43:13 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats