CVE-2025-46811: CWE-862: Missing Authorization in SUSE Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1
A Missing Authorization vulnerability in SUSE Linux Manager allows anyone with the ability to connect to port 443 of SUSE Manager is able to run any command as root on any client. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.
AI Analysis
Technical Summary
CVE-2025-46811 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting SUSE Linux Manager, specifically the container image suse/manager/5.0/x86_64/server:5.0.5.7.30.1 and related SUSE Manager Server Module versions prior to 4.3.87-150400.3.110.2. The vulnerability allows any unauthenticated attacker with network access to the SUSE Manager server's HTTPS port (443) to execute arbitrary commands with root privileges on any managed client system. This is due to a missing authorization check in the SUSE Manager interface, which fails to properly verify whether the connecting user has the necessary permissions to perform privileged operations. The flaw is remotely exploitable without any user interaction or authentication, making it highly dangerous. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation over the network. The affected products include multiple SUSE Manager server images deployed on various platforms including Azure, AWS EC2, and Google Cloud Engine, as well as on-premises container deployments. No known exploits have been reported in the wild yet, but the severity and simplicity of exploitation make it a prime target for attackers. The vulnerability affects SUSE Linux Manager versions before 5.0.27-150600.3.33.1 and 4.3.87-150400.3.110.2 for the respective product lines. This vulnerability could allow attackers to gain full control over managed client systems, potentially leading to data theft, disruption of services, or lateral movement within enterprise networks.
Potential Impact
For European organizations, the impact of CVE-2025-46811 could be severe. SUSE Linux Manager is widely used in enterprise environments for managing Linux infrastructure, including patch management, configuration, and compliance. Exploitation of this vulnerability would allow attackers to execute arbitrary commands as root on all managed client systems, potentially compromising sensitive data, disrupting critical business operations, and undermining trust in IT infrastructure. The ability to remotely gain root access without authentication increases the risk of widespread compromise, ransomware deployment, or espionage. Given the reliance of many European enterprises and public sector organizations on SUSE Linux for their server and cloud infrastructure, this vulnerability could affect critical industries such as finance, manufacturing, healthcare, and government services. The cross-platform nature of the affected SUSE Manager images, including cloud deployments, means that hybrid cloud environments common in Europe are also at risk. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent potential attacks.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update SUSE Linux Manager to versions 5.0.27-150600.3.33.1 or later for the 5.0 line, and 4.3.87-150400.3.110.2 or later for the 4.3 line, as these contain patches addressing the missing authorization issue. 2. Network segmentation: Restrict network access to the SUSE Manager server's port 443 to trusted administrative networks only, using firewalls and access control lists to minimize exposure. 3. Monitoring and logging: Enable detailed logging on SUSE Manager and monitor for unusual command execution or access patterns that could indicate exploitation attempts. 4. Use of VPN or zero-trust access: Require secure, authenticated access to the SUSE Manager interface through VPNs or zero-trust network architectures to prevent unauthorized external access. 5. Incident response readiness: Prepare incident response plans to quickly isolate and remediate affected systems if exploitation is detected. 6. Review client system integrity: After patching, verify the integrity of managed client systems to detect any unauthorized changes or persistence mechanisms installed by attackers. 7. Limit privileges: Where possible, reduce the number of clients managed by a single SUSE Manager instance or implement role-based access controls to limit blast radius in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-46811: CWE-862: Missing Authorization in SUSE Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1
Description
A Missing Authorization vulnerability in SUSE Linux Manager allows anyone with the ability to connect to port 443 of SUSE Manager is able to run any command as root on any client. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-46811 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting SUSE Linux Manager, specifically the container image suse/manager/5.0/x86_64/server:5.0.5.7.30.1 and related SUSE Manager Server Module versions prior to 4.3.87-150400.3.110.2. The vulnerability allows any unauthenticated attacker with network access to the SUSE Manager server's HTTPS port (443) to execute arbitrary commands with root privileges on any managed client system. This is due to a missing authorization check in the SUSE Manager interface, which fails to properly verify whether the connecting user has the necessary permissions to perform privileged operations. The flaw is remotely exploitable without any user interaction or authentication, making it highly dangerous. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation over the network. The affected products include multiple SUSE Manager server images deployed on various platforms including Azure, AWS EC2, and Google Cloud Engine, as well as on-premises container deployments. No known exploits have been reported in the wild yet, but the severity and simplicity of exploitation make it a prime target for attackers. The vulnerability affects SUSE Linux Manager versions before 5.0.27-150600.3.33.1 and 4.3.87-150400.3.110.2 for the respective product lines. This vulnerability could allow attackers to gain full control over managed client systems, potentially leading to data theft, disruption of services, or lateral movement within enterprise networks.
Potential Impact
For European organizations, the impact of CVE-2025-46811 could be severe. SUSE Linux Manager is widely used in enterprise environments for managing Linux infrastructure, including patch management, configuration, and compliance. Exploitation of this vulnerability would allow attackers to execute arbitrary commands as root on all managed client systems, potentially compromising sensitive data, disrupting critical business operations, and undermining trust in IT infrastructure. The ability to remotely gain root access without authentication increases the risk of widespread compromise, ransomware deployment, or espionage. Given the reliance of many European enterprises and public sector organizations on SUSE Linux for their server and cloud infrastructure, this vulnerability could affect critical industries such as finance, manufacturing, healthcare, and government services. The cross-platform nature of the affected SUSE Manager images, including cloud deployments, means that hybrid cloud environments common in Europe are also at risk. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent potential attacks.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update SUSE Linux Manager to versions 5.0.27-150600.3.33.1 or later for the 5.0 line, and 4.3.87-150400.3.110.2 or later for the 4.3 line, as these contain patches addressing the missing authorization issue. 2. Network segmentation: Restrict network access to the SUSE Manager server's port 443 to trusted administrative networks only, using firewalls and access control lists to minimize exposure. 3. Monitoring and logging: Enable detailed logging on SUSE Manager and monitor for unusual command execution or access patterns that could indicate exploitation attempts. 4. Use of VPN or zero-trust access: Require secure, authenticated access to the SUSE Manager interface through VPNs or zero-trust network architectures to prevent unauthorized external access. 5. Incident response readiness: Prepare incident response plans to quickly isolate and remediate affected systems if exploitation is detected. 6. Review client system integrity: After patching, verify the integrity of managed client systems to detect any unauthorized changes or persistence mechanisms installed by attackers. 7. Limit privileges: Where possible, reduce the number of clients managed by a single SUSE Manager instance or implement role-based access controls to limit blast radius in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- suse
- Date Reserved
- 2025-04-30T11:28:04.729Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2d10ad5a09ad00a699a8
Added to database: 7/30/2025, 2:32:48 PM
Last enriched: 9/4/2025, 12:43:08 AM
Last updated: 9/14/2025, 8:47:42 AM
Views: 121
Related Threats
CVE-2025-10398: Unrestricted Upload in fcba_zzm ics-park Smart Park Management System
MediumCVE-2025-10397: Server-Side Request Forgery in Magicblack MacCMS
MediumCVE-2025-10396: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10395: Server-Side Request Forgery in Magicblack MacCMS
MediumCVE-2025-10391: Server-Side Request Forgery in CRMEB
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.