CVE-2023-22647
moderate-risk
Published 2023-06-01
An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.
Do I need to act?
-
0.78% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: e91bb053386b32864bbbb306f39061e9f2e287ae, efc731b553111e5083ee6fb21587491f7e4fcdc9
9
CVSS 9.9/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22647
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22647
41
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal