Skip to main content

CVE-2025-46811: CWE-306: Missing Authentication for Critical Function in SUSE Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1

Critical
VulnerabilityCVE-2025-46811cvecve-2025-46811cwe-306
Published: Wed Jul 30 2025 (07/30/2025, 14:20:53 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1

Description

A Missing Authentication for Critical Function vulnerability in SUSE Manager allows anyone with access to the websocket at /rhn/websocket/minion/remote-commands to execute arbitrary commands as root. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 0.3.7-150600.3.6.2; Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.14-150600.4.17.1; Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.14-150600.4.17.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.33-150400.3.55.2; SUSE Manager Server Module 4.3: from ? before 0.3.7-150400.3.39.4; SUSE Manager Server Module 4.3: from ? before 4.3.33-150400.3.55.2; SUSE Manager Server Module 4.3: from ? before 4.3.33-150400.3.55.2.

AI-Powered Analysis

AILast updated: 07/30/2025, 14:47:52 UTC

Technical Analysis

CVE-2025-46811 is a critical vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting SUSE Manager Server containers and images, specifically versions prior to certain patched releases such as 5.0.14-150600.4.17.1 for the suse/manager/5.0/x86_64/server container and 4.3.33-150400.3.55.2 for SLES15-SP4-Manager-Server images. The vulnerability arises from a lack of authentication on a critical WebSocket endpoint located at /rhn/websocket/minion/remote-commands. This endpoint allows remote command execution without any authentication or user interaction, enabling an attacker with network access to the WebSocket to execute arbitrary commands with root privileges on the affected system. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible for attackers. The impact includes full compromise of confidentiality, integrity, and availability of the affected SUSE Manager Server instances. SUSE Manager is widely used for managing large Linux infrastructure deployments, including patch management, configuration, and monitoring, making this vulnerability particularly severe as it could allow attackers to gain control over critical infrastructure management systems. The vulnerability affects multiple containerized versions and cloud images (Azure, EC2, GCE), increasing the attack surface across on-premises and cloud environments. Although no known exploits are reported in the wild yet, the high CVSS score of 9.8 and the nature of the flaw suggest that exploitation could be straightforward once the vulnerability is discovered by attackers. The lack of authentication on a critical function is a fundamental security flaw that demands immediate remediation.

Potential Impact

For European organizations, the impact of CVE-2025-46811 is significant due to the widespread adoption of SUSE Linux Enterprise Server (SLES) and SUSE Manager for enterprise Linux infrastructure management. Organizations relying on SUSE Manager for patching, configuration management, and system monitoring could face complete system compromise if attackers exploit this vulnerability. This could lead to unauthorized access to sensitive data, disruption of IT operations, and potential lateral movement within corporate networks. Critical sectors such as finance, healthcare, manufacturing, and government agencies in Europe that depend on SUSE Manager for maintaining secure and compliant Linux environments are at heightened risk. The ability to execute arbitrary commands as root remotely could enable attackers to deploy ransomware, steal intellectual property, or disrupt critical services. Additionally, the vulnerability affects cloud-deployed instances (Azure, EC2, GCE), which are commonly used by European enterprises for hybrid cloud strategies, expanding the risk beyond on-premises deployments. The absence of authentication on a privileged interface also raises concerns about insider threats or compromised internal networks being leveraged for exploitation. Overall, the vulnerability poses a severe threat to the confidentiality, integrity, and availability of enterprise Linux management infrastructure in Europe.

Mitigation Recommendations

1. Immediate patching: Organizations should prioritize updating SUSE Manager Server containers and images to the fixed versions (e.g., 5.0.14-150600.4.17.1 or later for suse/manager containers and 4.3.33-150400.3.55.2 or later for SLES15-SP4-Manager-Server images). 2. Network segmentation: Restrict network access to the vulnerable WebSocket endpoint (/rhn/websocket/minion/remote-commands) by implementing strict firewall rules and network segmentation to limit exposure only to trusted management networks. 3. Access controls: Employ additional authentication and authorization mechanisms at the network perimeter or via reverse proxies to enforce access control on the WebSocket interface until patches are applied. 4. Monitoring and detection: Deploy monitoring solutions to detect unusual or unauthorized command execution attempts on SUSE Manager servers, including anomalous WebSocket traffic patterns. 5. Incident response readiness: Prepare incident response plans specifically addressing potential exploitation of this vulnerability, including isolating affected systems and forensic analysis. 6. Cloud environment controls: For cloud deployments, enforce strict IAM policies and network security groups to limit exposure of SUSE Manager instances. 7. Vendor communication: Stay updated with SUSE advisories for any additional patches or mitigations and apply them promptly. These steps go beyond generic advice by focusing on immediate patching combined with network-level controls and monitoring tailored to the specific vulnerable interface and deployment scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-04-30T11:28:04.729Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688a2d10ad5a09ad00a699a8

Added to database: 7/30/2025, 2:32:48 PM

Last enriched: 7/30/2025, 2:47:52 PM

Last updated: 7/31/2025, 9:05:03 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats