CVE-2025-46811: CWE-862: Missing Authorization in SUSE Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1
A Missing Authorization vulnerability in SUSE Linux Manager allows anyone with the ability to connect to port 443 of SUSE Manager is able to run any command as root on any client. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.
AI Analysis
Technical Summary
CVE-2025-46811 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting SUSE Linux Manager, specifically the container image suse/manager/5.0/x86_64/server:5.0.5.7.30.1 and several related SLES15-SP4 Manager Server images and modules. The vulnerability allows any attacker who can connect to the SUSE Manager server's HTTPS port (443) to execute arbitrary commands as root on any managed client system without requiring authentication or user interaction. This is due to a failure in enforcing proper authorization checks within the SUSE Manager server's command execution functionality. The affected versions include all releases before 5.0.27-150600.3.33.1 for the container and before 4.3.87-150400.3.110.2 for the various SLES15-SP4 Manager Server images and modules. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Successful exploitation results in complete compromise of managed client systems, potentially allowing attackers to control critical infrastructure components managed via SUSE Manager. Although no public exploits are currently known, the vulnerability's characteristics make it highly exploitable. SUSE has published advisories and fixed versions to address this issue, but no direct patch links are provided in the source data. The vulnerability highlights the importance of strict authorization enforcement in management platforms that have privileged access to client systems.
Potential Impact
The impact of CVE-2025-46811 is severe for organizations using SUSE Linux Manager to administer client systems. An attacker exploiting this vulnerability can gain root-level command execution on any managed client without authentication, leading to full system compromise. This can result in data breaches, unauthorized data modification or destruction, deployment of malware or ransomware, lateral movement within networks, and disruption of critical services. Since SUSE Manager is often used in enterprise and cloud environments to manage large fleets of Linux systems, the scope of impact can be extensive, affecting operational continuity and security posture. The vulnerability undermines trust in centralized management infrastructure and can facilitate advanced persistent threats targeting critical infrastructure, government, finance, telecommunications, and cloud service providers. The ease of exploitation combined with the high privileges granted makes this a critical risk that demands immediate remediation.
Mitigation Recommendations
To mitigate CVE-2025-46811, organizations should: 1) Immediately upgrade SUSE Manager containers and server images to versions 5.0.27-150600.3.33.1 or later for the container, and 4.3.87-150400.3.110.2 or later for SLES15-SP4 Manager Server images and modules, as provided by SUSE advisories. 2) Restrict network access to the SUSE Manager server's port 443 to trusted administrative networks only, using firewalls and network segmentation to reduce exposure. 3) Implement strict monitoring and alerting for unusual command execution or administrative activity originating from the SUSE Manager server. 4) Review and harden SUSE Manager configurations to ensure least privilege principles are enforced where possible. 5) Conduct thorough audits of managed client systems for signs of compromise if patching is delayed. 6) Employ multi-factor authentication and VPN access controls for management interfaces to add layers of defense. 7) Stay informed on SUSE security advisories for any additional patches or mitigations. These steps go beyond generic advice by focusing on network-level controls, configuration hardening, and proactive detection tailored to the SUSE Manager environment.
Affected Countries
United States, Germany, Japan, United Kingdom, France, Canada, Australia, Netherlands, Sweden, Switzerland, India, South Korea, China, Brazil, Singapore
CVE-2025-46811: CWE-862: Missing Authorization in SUSE Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1
Description
A Missing Authorization vulnerability in SUSE Linux Manager allows anyone with the ability to connect to port 443 of SUSE Manager is able to run any command as root on any client. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-46811 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting SUSE Linux Manager, specifically the container image suse/manager/5.0/x86_64/server:5.0.5.7.30.1 and several related SLES15-SP4 Manager Server images and modules. The vulnerability allows any attacker who can connect to the SUSE Manager server's HTTPS port (443) to execute arbitrary commands as root on any managed client system without requiring authentication or user interaction. This is due to a failure in enforcing proper authorization checks within the SUSE Manager server's command execution functionality. The affected versions include all releases before 5.0.27-150600.3.33.1 for the container and before 4.3.87-150400.3.110.2 for the various SLES15-SP4 Manager Server images and modules. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Successful exploitation results in complete compromise of managed client systems, potentially allowing attackers to control critical infrastructure components managed via SUSE Manager. Although no public exploits are currently known, the vulnerability's characteristics make it highly exploitable. SUSE has published advisories and fixed versions to address this issue, but no direct patch links are provided in the source data. The vulnerability highlights the importance of strict authorization enforcement in management platforms that have privileged access to client systems.
Potential Impact
The impact of CVE-2025-46811 is severe for organizations using SUSE Linux Manager to administer client systems. An attacker exploiting this vulnerability can gain root-level command execution on any managed client without authentication, leading to full system compromise. This can result in data breaches, unauthorized data modification or destruction, deployment of malware or ransomware, lateral movement within networks, and disruption of critical services. Since SUSE Manager is often used in enterprise and cloud environments to manage large fleets of Linux systems, the scope of impact can be extensive, affecting operational continuity and security posture. The vulnerability undermines trust in centralized management infrastructure and can facilitate advanced persistent threats targeting critical infrastructure, government, finance, telecommunications, and cloud service providers. The ease of exploitation combined with the high privileges granted makes this a critical risk that demands immediate remediation.
Mitigation Recommendations
To mitigate CVE-2025-46811, organizations should: 1) Immediately upgrade SUSE Manager containers and server images to versions 5.0.27-150600.3.33.1 or later for the container, and 4.3.87-150400.3.110.2 or later for SLES15-SP4 Manager Server images and modules, as provided by SUSE advisories. 2) Restrict network access to the SUSE Manager server's port 443 to trusted administrative networks only, using firewalls and network segmentation to reduce exposure. 3) Implement strict monitoring and alerting for unusual command execution or administrative activity originating from the SUSE Manager server. 4) Review and harden SUSE Manager configurations to ensure least privilege principles are enforced where possible. 5) Conduct thorough audits of managed client systems for signs of compromise if patching is delayed. 6) Employ multi-factor authentication and VPN access controls for management interfaces to add layers of defense. 7) Stay informed on SUSE security advisories for any additional patches or mitigations. These steps go beyond generic advice by focusing on network-level controls, configuration hardening, and proactive detection tailored to the SUSE Manager environment.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- suse
- Date Reserved
- 2025-04-30T11:28:04.729Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2d10ad5a09ad00a699a8
Added to database: 7/30/2025, 2:32:48 PM
Last enriched: 2/27/2026, 2:30:49 AM
Last updated: 3/24/2026, 7:03:50 PM
Views: 273
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.