Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46811: CWE-862: Missing Authorization in SUSE Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1

0
Critical
VulnerabilityCVE-2025-46811cvecve-2025-46811cwe-862
Published: Wed Jul 30 2025 (07/30/2025, 14:20:53 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1

Description

A Missing Authorization vulnerability in SUSE Linux Manager allows anyone with the ability to connect to port 443 of SUSE Manager is able to run any command as root on any client. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:30:49 UTC

Technical Analysis

CVE-2025-46811 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting SUSE Linux Manager, specifically the container image suse/manager/5.0/x86_64/server:5.0.5.7.30.1 and several related SLES15-SP4 Manager Server images and modules. The vulnerability allows any attacker who can connect to the SUSE Manager server's HTTPS port (443) to execute arbitrary commands as root on any managed client system without requiring authentication or user interaction. This is due to a failure in enforcing proper authorization checks within the SUSE Manager server's command execution functionality. The affected versions include all releases before 5.0.27-150600.3.33.1 for the container and before 4.3.87-150400.3.110.2 for the various SLES15-SP4 Manager Server images and modules. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Successful exploitation results in complete compromise of managed client systems, potentially allowing attackers to control critical infrastructure components managed via SUSE Manager. Although no public exploits are currently known, the vulnerability's characteristics make it highly exploitable. SUSE has published advisories and fixed versions to address this issue, but no direct patch links are provided in the source data. The vulnerability highlights the importance of strict authorization enforcement in management platforms that have privileged access to client systems.

Potential Impact

The impact of CVE-2025-46811 is severe for organizations using SUSE Linux Manager to administer client systems. An attacker exploiting this vulnerability can gain root-level command execution on any managed client without authentication, leading to full system compromise. This can result in data breaches, unauthorized data modification or destruction, deployment of malware or ransomware, lateral movement within networks, and disruption of critical services. Since SUSE Manager is often used in enterprise and cloud environments to manage large fleets of Linux systems, the scope of impact can be extensive, affecting operational continuity and security posture. The vulnerability undermines trust in centralized management infrastructure and can facilitate advanced persistent threats targeting critical infrastructure, government, finance, telecommunications, and cloud service providers. The ease of exploitation combined with the high privileges granted makes this a critical risk that demands immediate remediation.

Mitigation Recommendations

To mitigate CVE-2025-46811, organizations should: 1) Immediately upgrade SUSE Manager containers and server images to versions 5.0.27-150600.3.33.1 or later for the container, and 4.3.87-150400.3.110.2 or later for SLES15-SP4 Manager Server images and modules, as provided by SUSE advisories. 2) Restrict network access to the SUSE Manager server's port 443 to trusted administrative networks only, using firewalls and network segmentation to reduce exposure. 3) Implement strict monitoring and alerting for unusual command execution or administrative activity originating from the SUSE Manager server. 4) Review and harden SUSE Manager configurations to ensure least privilege principles are enforced where possible. 5) Conduct thorough audits of managed client systems for signs of compromise if patching is delayed. 6) Employ multi-factor authentication and VPN access controls for management interfaces to add layers of defense. 7) Stay informed on SUSE security advisories for any additional patches or mitigations. These steps go beyond generic advice by focusing on network-level controls, configuration hardening, and proactive detection tailored to the SUSE Manager environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-04-30T11:28:04.729Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688a2d10ad5a09ad00a699a8

Added to database: 7/30/2025, 2:32:48 PM

Last enriched: 2/27/2026, 2:30:49 AM

Last updated: 3/24/2026, 7:03:50 PM

Views: 273

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses