CVE-2021-36783
moderate-risk
Published 2022-09-07
A Insufficiently Protected Credentials vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners and Project Members to read credentials, passwords and API tokens that have been stored in cleartext and exposed via API endpoints. This issue affects: SUSE Rancher Rancher versions prior to 2.6.4; Rancher versions prior to 2.5.13.
Do I need to act?
-
0.48% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 7218c48a6f516b72ec4586a790b3b9f1e1fe792b, 8eb8c3280aeb31eff311452b9c7f6a8ff674ed57
9
CVSS 9.9/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1193990
Third Party Advisory
https://github.com/rancher/rancher/security/advisories/GHSA-8w87-58w6-hfv8
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1193990
Third Party Advisory
https://github.com/rancher/rancher/security/advisories/GHSA-8w87-58w6-hfv8
40
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal