CVE-2025-23391: CWE-266: Incorrect Privilege Assignment in SUSE rancher
A Incorrect Privilege Assignment vulnerability in SUSE rancher allows a Restricted Administrator to change the password of Administrators and take over their accounts. This issue affects rancher: from 2.8.0 before 2.8.14, from 2.9.0 before 2.9.8, from 2.10.0 before 2.10.4.
AI Analysis
Technical Summary
CVE-2025-23391 is a critical security vulnerability identified in SUSE Rancher, a widely used Kubernetes management platform. The flaw arises from incorrect privilege assignment (CWE-266), where a Restricted Administrator role is improperly permitted to change the passwords of full Administrator accounts. This misconfiguration allows an attacker with Restricted Administrator access to escalate privileges by resetting Administrator passwords and gaining full control over Rancher environments. The vulnerability affects Rancher versions from 2.8.0 up to but not including 2.8.14, from 2.9.0 up to but not including 2.9.8, and from 2.10.0 up to but not including 2.10.4. The CVSS v3.1 base score is 9.1, indicating a critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change that impacts confidentiality, integrity, and availability. Exploitation could lead to complete compromise of Kubernetes cluster management, allowing attackers to deploy malicious workloads, exfiltrate data, or disrupt services. Although no exploits are currently known in the wild, the vulnerability’s nature and severity make it a high-risk issue for organizations relying on Rancher for container orchestration.
Potential Impact
The impact of CVE-2025-23391 is severe for organizations using affected versions of SUSE Rancher. Successful exploitation allows attackers with Restricted Administrator privileges to escalate to full Administrator accounts, gaining unrestricted control over Kubernetes cluster management. This can lead to unauthorized deployment of malicious containers, data breaches, disruption of critical services, and potential lateral movement within the infrastructure. Given Rancher's role in managing containerized workloads, the compromise could affect cloud-native applications, DevOps pipelines, and production environments, causing significant operational and reputational damage. The vulnerability threatens confidentiality by exposing sensitive credentials and configurations, integrity by enabling unauthorized changes, and availability by potentially disrupting cluster operations.
Mitigation Recommendations
Organizations should immediately upgrade affected Rancher instances to the fixed versions: 2.8.14 or later, 2.9.8 or later, and 2.10.4 or later. Until patches are applied, restrict network access to Rancher management interfaces to trusted administrators only and monitor for unusual password change activities, especially from Restricted Administrator accounts. Implement strict role-based access controls (RBAC) and audit logs to detect privilege escalation attempts. Consider temporarily disabling or limiting the use of Restricted Administrator roles if feasible. Regularly review and rotate administrator credentials and enforce multi-factor authentication (MFA) where supported. Additionally, conduct thorough security assessments of Kubernetes clusters managed by Rancher to detect any signs of compromise resulting from this vulnerability.
Affected Countries
United States, Germany, Japan, United Kingdom, Canada, Australia, France, Netherlands, South Korea, India
CVE-2025-23391: CWE-266: Incorrect Privilege Assignment in SUSE rancher
Description
A Incorrect Privilege Assignment vulnerability in SUSE rancher allows a Restricted Administrator to change the password of Administrators and take over their accounts. This issue affects rancher: from 2.8.0 before 2.8.14, from 2.9.0 before 2.9.8, from 2.10.0 before 2.10.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-23391 is a critical security vulnerability identified in SUSE Rancher, a widely used Kubernetes management platform. The flaw arises from incorrect privilege assignment (CWE-266), where a Restricted Administrator role is improperly permitted to change the passwords of full Administrator accounts. This misconfiguration allows an attacker with Restricted Administrator access to escalate privileges by resetting Administrator passwords and gaining full control over Rancher environments. The vulnerability affects Rancher versions from 2.8.0 up to but not including 2.8.14, from 2.9.0 up to but not including 2.9.8, and from 2.10.0 up to but not including 2.10.4. The CVSS v3.1 base score is 9.1, indicating a critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change that impacts confidentiality, integrity, and availability. Exploitation could lead to complete compromise of Kubernetes cluster management, allowing attackers to deploy malicious workloads, exfiltrate data, or disrupt services. Although no exploits are currently known in the wild, the vulnerability’s nature and severity make it a high-risk issue for organizations relying on Rancher for container orchestration.
Potential Impact
The impact of CVE-2025-23391 is severe for organizations using affected versions of SUSE Rancher. Successful exploitation allows attackers with Restricted Administrator privileges to escalate to full Administrator accounts, gaining unrestricted control over Kubernetes cluster management. This can lead to unauthorized deployment of malicious containers, data breaches, disruption of critical services, and potential lateral movement within the infrastructure. Given Rancher's role in managing containerized workloads, the compromise could affect cloud-native applications, DevOps pipelines, and production environments, causing significant operational and reputational damage. The vulnerability threatens confidentiality by exposing sensitive credentials and configurations, integrity by enabling unauthorized changes, and availability by potentially disrupting cluster operations.
Mitigation Recommendations
Organizations should immediately upgrade affected Rancher instances to the fixed versions: 2.8.14 or later, 2.9.8 or later, and 2.10.4 or later. Until patches are applied, restrict network access to Rancher management interfaces to trusted administrators only and monitor for unusual password change activities, especially from Restricted Administrator accounts. Implement strict role-based access controls (RBAC) and audit logs to detect privilege escalation attempts. Consider temporarily disabling or limiting the use of Restricted Administrator roles if feasible. Regularly review and rotate administrator credentials and enforce multi-factor authentication (MFA) where supported. Additionally, conduct thorough security assessments of Kubernetes clusters managed by Rancher to detect any signs of compromise resulting from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- suse
- Date Reserved
- 2025-01-15T12:39:03.324Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a1bf85912abc71d0ac3a
Added to database: 2/26/2026, 7:40:47 PM
Last enriched: 2/26/2026, 7:54:33 PM
Last updated: 2/26/2026, 11:03:30 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28211: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in CyrilleB79 NVDA-Dev-Test-Toolbox
HighCVE-2026-28207: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in z-libs Zen-C
MediumCVE-2026-3265: Improper Authorization in go2ismail Free-CRM
MediumCVE-2026-28225: CWE-639: Authorization Bypass Through User-Controlled Key in manyfold3d manyfold
MediumCVE-2026-28213: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in evershopcommerce evershop
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.