Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67601: CWE-295: Improper Certificate Validation in SUSE rancher

0
High
VulnerabilityCVE-2025-67601cvecve-2025-67601cwe-295
Published: Wed Feb 25 2026 (02/25/2026, 10:36:57 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: rancher

Description

A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 20:28:02 UTC

Technical Analysis

CVE-2025-67601 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in SUSE Rancher Manager, specifically affecting versions 0 through 2.13.0. The issue arises when administrators use self-signed CA certificates and invoke the Rancher CLI login command with the -skip-verify flag but omit the –cacert flag. Under these conditions, the CLI attempts to retrieve CA certificates from Rancher’s internal settings (cacerts), which may be manipulated or insufficiently validated. This improper validation can lead to acceptance of untrusted or malicious certificates, enabling attackers to perform man-in-the-middle (MITM) attacks or spoof Rancher server identities. The vulnerability has a CVSS 3.1 base score of 8.3, reflecting network attack vector, high complexity, no privileges required, user interaction required, and a scope change with high impact on confidentiality, integrity, and availability. Although no exploits are known in the wild yet, the flaw’s nature and Rancher’s widespread use in Kubernetes cluster management make it a significant risk. The vulnerability highlights the risk of insecure CLI usage patterns combined with self-signed certificates and insufficient certificate validation mechanisms within Rancher’s CLI tooling.

Potential Impact

The vulnerability could allow attackers to intercept or manipulate communications between the Rancher CLI and the Rancher Manager server by exploiting improper certificate validation. This can lead to unauthorized disclosure of sensitive cluster management credentials, unauthorized command execution, or disruption of cluster operations. Given Rancher’s role in managing Kubernetes clusters, a successful attack could compromise container orchestration environments, leading to potential lateral movement within cloud or on-premises infrastructure, data breaches, or denial of service. The high CVSS score indicates severe impacts on confidentiality, integrity, and availability. Organizations relying on Rancher for critical infrastructure management are at risk of operational disruption and data compromise if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately audit their use of the Rancher CLI login command, ensuring that when using self-signed CA certificates, the –cacert flag is always specified alongside or instead of the -skip-verify flag to enforce proper certificate validation. Avoid using the -skip-verify flag unless absolutely necessary and understand its implications. Administrators should update Rancher Manager and CLI tools to the latest patched versions once available from SUSE. In the interim, restrict CLI access to trusted networks and users, monitor Rancher logs for unusual authentication attempts, and consider implementing network-level protections such as TLS interception detection and strict firewall rules. Additionally, educate users on secure certificate handling practices and review Rancher’s stored CA certificates for unauthorized changes. Employ multi-factor authentication and role-based access controls to limit the impact of potential credential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2025-12-09T14:05:21.453Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699ed8e3b7ef31ef0bfe5902

Added to database: 2/25/2026, 11:11:31 AM

Last enriched: 3/4/2026, 8:28:02 PM

Last updated: 4/11/2026, 4:00:29 PM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses