CVE-2025-67601: CWE-295: Improper Certificate Validation in SUSE rancher
A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts.
AI Analysis
Technical Summary
CVE-2025-67601 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in SUSE Rancher Manager, specifically affecting versions 0 through 2.13.0. The issue arises when administrators use self-signed CA certificates and invoke the Rancher CLI login command with the -skip-verify flag but omit the –cacert flag. Under these conditions, the CLI attempts to retrieve CA certificates from Rancher’s internal settings (cacerts), which may be manipulated or insufficiently validated. This improper validation can lead to acceptance of untrusted or malicious certificates, enabling attackers to perform man-in-the-middle (MITM) attacks or spoof Rancher server identities. The vulnerability has a CVSS 3.1 base score of 8.3, reflecting network attack vector, high complexity, no privileges required, user interaction required, and a scope change with high impact on confidentiality, integrity, and availability. Although no exploits are known in the wild yet, the flaw’s nature and Rancher’s widespread use in Kubernetes cluster management make it a significant risk. The vulnerability highlights the risk of insecure CLI usage patterns combined with self-signed certificates and insufficient certificate validation mechanisms within Rancher’s CLI tooling.
Potential Impact
The vulnerability could allow attackers to intercept or manipulate communications between the Rancher CLI and the Rancher Manager server by exploiting improper certificate validation. This can lead to unauthorized disclosure of sensitive cluster management credentials, unauthorized command execution, or disruption of cluster operations. Given Rancher’s role in managing Kubernetes clusters, a successful attack could compromise container orchestration environments, leading to potential lateral movement within cloud or on-premises infrastructure, data breaches, or denial of service. The high CVSS score indicates severe impacts on confidentiality, integrity, and availability. Organizations relying on Rancher for critical infrastructure management are at risk of operational disruption and data compromise if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately audit their use of the Rancher CLI login command, ensuring that when using self-signed CA certificates, the –cacert flag is always specified alongside or instead of the -skip-verify flag to enforce proper certificate validation. Avoid using the -skip-verify flag unless absolutely necessary and understand its implications. Administrators should update Rancher Manager and CLI tools to the latest patched versions once available from SUSE. In the interim, restrict CLI access to trusted networks and users, monitor Rancher logs for unusual authentication attempts, and consider implementing network-level protections such as TLS interception detection and strict firewall rules. Additionally, educate users on secure certificate handling practices and review Rancher’s stored CA certificates for unauthorized changes. Employ multi-factor authentication and role-based access controls to limit the impact of potential credential compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2025-67601: CWE-295: Improper Certificate Validation in SUSE rancher
Description
A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-67601 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in SUSE Rancher Manager, specifically affecting versions 0 through 2.13.0. The issue arises when administrators use self-signed CA certificates and invoke the Rancher CLI login command with the -skip-verify flag but omit the –cacert flag. Under these conditions, the CLI attempts to retrieve CA certificates from Rancher’s internal settings (cacerts), which may be manipulated or insufficiently validated. This improper validation can lead to acceptance of untrusted or malicious certificates, enabling attackers to perform man-in-the-middle (MITM) attacks or spoof Rancher server identities. The vulnerability has a CVSS 3.1 base score of 8.3, reflecting network attack vector, high complexity, no privileges required, user interaction required, and a scope change with high impact on confidentiality, integrity, and availability. Although no exploits are known in the wild yet, the flaw’s nature and Rancher’s widespread use in Kubernetes cluster management make it a significant risk. The vulnerability highlights the risk of insecure CLI usage patterns combined with self-signed certificates and insufficient certificate validation mechanisms within Rancher’s CLI tooling.
Potential Impact
The vulnerability could allow attackers to intercept or manipulate communications between the Rancher CLI and the Rancher Manager server by exploiting improper certificate validation. This can lead to unauthorized disclosure of sensitive cluster management credentials, unauthorized command execution, or disruption of cluster operations. Given Rancher’s role in managing Kubernetes clusters, a successful attack could compromise container orchestration environments, leading to potential lateral movement within cloud or on-premises infrastructure, data breaches, or denial of service. The high CVSS score indicates severe impacts on confidentiality, integrity, and availability. Organizations relying on Rancher for critical infrastructure management are at risk of operational disruption and data compromise if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately audit their use of the Rancher CLI login command, ensuring that when using self-signed CA certificates, the –cacert flag is always specified alongside or instead of the -skip-verify flag to enforce proper certificate validation. Avoid using the -skip-verify flag unless absolutely necessary and understand its implications. Administrators should update Rancher Manager and CLI tools to the latest patched versions once available from SUSE. In the interim, restrict CLI access to trusted networks and users, monitor Rancher logs for unusual authentication attempts, and consider implementing network-level protections such as TLS interception detection and strict firewall rules. Additionally, educate users on secure certificate handling practices and review Rancher’s stored CA certificates for unauthorized changes. Employ multi-factor authentication and role-based access controls to limit the impact of potential credential compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- suse
- Date Reserved
- 2025-12-09T14:05:21.453Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699ed8e3b7ef31ef0bfe5902
Added to database: 2/25/2026, 11:11:31 AM
Last enriched: 3/4/2026, 8:28:02 PM
Last updated: 4/11/2026, 4:00:29 PM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.