Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67601: CWE-295: Improper Certificate Validation in SUSE rancher

0
High
VulnerabilityCVE-2025-67601cvecve-2025-67601cwe-295
Published: Wed Feb 25 2026 (02/25/2026, 10:36:57 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: rancher

Description

CVE-2025-67601 is a high-severity vulnerability in SUSE Rancher Manager affecting versions up to 2. 13. 0. It involves improper certificate validation (CWE-295) when using self-signed CA certificates combined with the Rancher CLI login command's -skip-verify flag without the –cacert flag. This causes the CLI to fetch CA certificates from Rancher’s stored settings (cacerts), potentially allowing attackers to bypass TLS verification. The vulnerability has a CVSS score of 8. 3, indicating high impact on confidentiality, integrity, and availability. Exploitation requires network access and user interaction but no privileges. No known exploits are currently reported in the wild. Organizations using Rancher for container management should urgently review their CLI usage and certificate handling to mitigate risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 11:25:49 UTC

Technical Analysis

CVE-2025-67601 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in SUSE Rancher Manager, specifically affecting versions 0 through 2.13.0. The issue arises when administrators use self-signed CA certificates and invoke the Rancher CLI login command with the -skip-verify flag but omit the –cacert flag. Under these conditions, the CLI attempts to retrieve CA certificates from Rancher’s internal settings (cacerts), which may be manipulated or insufficiently validated. This improper validation can lead to a man-in-the-middle (MITM) attack or allow an attacker to impersonate Rancher servers, compromising the TLS trust model. The vulnerability affects the confidentiality, integrity, and availability of Rancher-managed environments by potentially exposing sensitive data, allowing unauthorized command execution, or disrupting cluster management operations. The CVSS v3.1 score of 8.3 reflects a high severity due to network attack vector, high impact on all security properties, and the requirement of user interaction but no privileges. Although no exploits are currently known in the wild, the vulnerability presents a significant risk given Rancher’s widespread use in container orchestration and Kubernetes management. The flaw stems from a design oversight in how the CLI handles certificate verification flags and CA certificate sources, emphasizing the need for strict validation and explicit certificate specification when bypassing verification.

Potential Impact

The vulnerability could allow attackers to perform man-in-the-middle attacks by exploiting improper certificate validation, leading to interception or manipulation of sensitive data transmitted between Rancher CLI clients and Rancher servers. This can compromise the confidentiality of credentials and cluster information, integrity of commands and configurations, and availability of Rancher-managed services. Organizations relying on Rancher for Kubernetes cluster management could face unauthorized access, cluster disruption, or data breaches. Given Rancher’s role in container orchestration, exploitation could cascade to compromise containerized applications and infrastructure. The requirement for user interaction (CLI login) limits automated exploitation but does not eliminate risk, especially in environments where CLI usage is frequent and automated scripts might be misconfigured. The high CVSS score reflects the broad impact and potential for serious operational disruption and data compromise.

Mitigation Recommendations

Organizations should immediately audit their use of the Rancher CLI login command, ensuring that when the -skip-verify flag is used, the –cacert flag is also explicitly provided with a trusted CA certificate to prevent fallback to insecure certificate sources. Avoid using self-signed certificates where possible; instead, use certificates issued by trusted certificate authorities. Update Rancher Manager and CLI tools to the latest patched versions once available from SUSE. Implement strict network segmentation and monitoring around Rancher management interfaces to detect anomalous certificate or network activity. Educate administrators and DevOps teams on secure certificate handling and the risks of bypassing TLS verification. Consider integrating automated checks in CI/CD pipelines to flag insecure CLI usage patterns. Finally, monitor SUSE advisories for patches or additional guidance and apply them promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2025-12-09T14:05:21.453Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699ed8e3b7ef31ef0bfe5902

Added to database: 2/25/2026, 11:11:31 AM

Last enriched: 2/25/2026, 11:25:49 AM

Last updated: 2/25/2026, 1:14:52 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats