Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23391: CWE-266: Incorrect Privilege Assignment in SUSE rancher

0
Critical
VulnerabilityCVE-2025-23391cvecve-2025-23391cwe-266
Published: Fri Apr 11 2025 (04/11/2025, 10:38:43 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: rancher

Description

A Incorrect Privilege Assignment vulnerability in SUSE rancher allows a Restricted Administrator to change the password of Administrators and take over their accounts. This issue affects rancher: from 2.8.0 before 2.8.14, from 2.9.0 before 2.9.8, from 2.10.0 before 2.10.4.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:54:33 UTC

Technical Analysis

CVE-2025-23391 is a critical security vulnerability identified in SUSE Rancher, a widely used Kubernetes management platform. The flaw arises from incorrect privilege assignment (CWE-266), where a Restricted Administrator role is improperly permitted to change the passwords of full Administrator accounts. This misconfiguration allows an attacker with Restricted Administrator access to escalate privileges by resetting Administrator passwords and gaining full control over Rancher environments. The vulnerability affects Rancher versions from 2.8.0 up to but not including 2.8.14, from 2.9.0 up to but not including 2.9.8, and from 2.10.0 up to but not including 2.10.4. The CVSS v3.1 base score is 9.1, indicating a critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change that impacts confidentiality, integrity, and availability. Exploitation could lead to complete compromise of Kubernetes cluster management, allowing attackers to deploy malicious workloads, exfiltrate data, or disrupt services. Although no exploits are currently known in the wild, the vulnerability’s nature and severity make it a high-risk issue for organizations relying on Rancher for container orchestration.

Potential Impact

The impact of CVE-2025-23391 is severe for organizations using affected versions of SUSE Rancher. Successful exploitation allows attackers with Restricted Administrator privileges to escalate to full Administrator accounts, gaining unrestricted control over Kubernetes cluster management. This can lead to unauthorized deployment of malicious containers, data breaches, disruption of critical services, and potential lateral movement within the infrastructure. Given Rancher's role in managing containerized workloads, the compromise could affect cloud-native applications, DevOps pipelines, and production environments, causing significant operational and reputational damage. The vulnerability threatens confidentiality by exposing sensitive credentials and configurations, integrity by enabling unauthorized changes, and availability by potentially disrupting cluster operations.

Mitigation Recommendations

Organizations should immediately upgrade affected Rancher instances to the fixed versions: 2.8.14 or later, 2.9.8 or later, and 2.10.4 or later. Until patches are applied, restrict network access to Rancher management interfaces to trusted administrators only and monitor for unusual password change activities, especially from Restricted Administrator accounts. Implement strict role-based access controls (RBAC) and audit logs to detect privilege escalation attempts. Consider temporarily disabling or limiting the use of Restricted Administrator roles if feasible. Regularly review and rotate administrator credentials and enforce multi-factor authentication (MFA) where supported. Additionally, conduct thorough security assessments of Kubernetes clusters managed by Rancher to detect any signs of compromise resulting from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2025-01-15T12:39:03.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1bf85912abc71d0ac3a

Added to database: 2/26/2026, 7:40:47 PM

Last enriched: 2/26/2026, 7:54:33 PM

Last updated: 2/26/2026, 11:03:30 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses