Skip to main content

CVE-2025-46811: CWE-862: Missing Authorization in SUSE Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1

Critical
VulnerabilityCVE-2025-46811cvecve-2025-46811cwe-862
Published: Wed Jul 30 2025 (07/30/2025, 14:20:53 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1

Description

A Missing Authorization vulnerability in SUSE Linux Manager allows anyone with the ability to connect to port 443 of SUSE Manager is able to run any command as root on any client. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.

AI-Powered Analysis

AILast updated: 09/04/2025, 00:43:08 UTC

Technical Analysis

CVE-2025-46811 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting SUSE Linux Manager, specifically the container image suse/manager/5.0/x86_64/server:5.0.5.7.30.1 and related SUSE Manager Server Module versions prior to 4.3.87-150400.3.110.2. The vulnerability allows any unauthenticated attacker with network access to the SUSE Manager server's HTTPS port (443) to execute arbitrary commands with root privileges on any managed client system. This is due to a missing authorization check in the SUSE Manager interface, which fails to properly verify whether the connecting user has the necessary permissions to perform privileged operations. The flaw is remotely exploitable without any user interaction or authentication, making it highly dangerous. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation over the network. The affected products include multiple SUSE Manager server images deployed on various platforms including Azure, AWS EC2, and Google Cloud Engine, as well as on-premises container deployments. No known exploits have been reported in the wild yet, but the severity and simplicity of exploitation make it a prime target for attackers. The vulnerability affects SUSE Linux Manager versions before 5.0.27-150600.3.33.1 and 4.3.87-150400.3.110.2 for the respective product lines. This vulnerability could allow attackers to gain full control over managed client systems, potentially leading to data theft, disruption of services, or lateral movement within enterprise networks.

Potential Impact

For European organizations, the impact of CVE-2025-46811 could be severe. SUSE Linux Manager is widely used in enterprise environments for managing Linux infrastructure, including patch management, configuration, and compliance. Exploitation of this vulnerability would allow attackers to execute arbitrary commands as root on all managed client systems, potentially compromising sensitive data, disrupting critical business operations, and undermining trust in IT infrastructure. The ability to remotely gain root access without authentication increases the risk of widespread compromise, ransomware deployment, or espionage. Given the reliance of many European enterprises and public sector organizations on SUSE Linux for their server and cloud infrastructure, this vulnerability could affect critical industries such as finance, manufacturing, healthcare, and government services. The cross-platform nature of the affected SUSE Manager images, including cloud deployments, means that hybrid cloud environments common in Europe are also at risk. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent potential attacks.

Mitigation Recommendations

1. Immediate upgrade: Organizations should promptly update SUSE Linux Manager to versions 5.0.27-150600.3.33.1 or later for the 5.0 line, and 4.3.87-150400.3.110.2 or later for the 4.3 line, as these contain patches addressing the missing authorization issue. 2. Network segmentation: Restrict network access to the SUSE Manager server's port 443 to trusted administrative networks only, using firewalls and access control lists to minimize exposure. 3. Monitoring and logging: Enable detailed logging on SUSE Manager and monitor for unusual command execution or access patterns that could indicate exploitation attempts. 4. Use of VPN or zero-trust access: Require secure, authenticated access to the SUSE Manager interface through VPNs or zero-trust network architectures to prevent unauthorized external access. 5. Incident response readiness: Prepare incident response plans to quickly isolate and remediate affected systems if exploitation is detected. 6. Review client system integrity: After patching, verify the integrity of managed client systems to detect any unauthorized changes or persistence mechanisms installed by attackers. 7. Limit privileges: Where possible, reduce the number of clients managed by a single SUSE Manager instance or implement role-based access controls to limit blast radius in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-04-30T11:28:04.729Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688a2d10ad5a09ad00a699a8

Added to database: 7/30/2025, 2:32:48 PM

Last enriched: 9/4/2025, 12:43:08 AM

Last updated: 9/14/2025, 8:47:42 AM

Views: 121

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats