// For flags

CVE-2021-32001

K3s/RKE2 bootstrap data is encrypted with empty string if user does not supply a token

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

K3s in SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup, to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc.) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions.

K3s en SUSE Rancher permite a cualquier usuario con acceso directo al almacén de datos, o a una copia de seguridad del almacén de datos, extraer el material de clave confidencial del clúster (claves privadas de la autoridad de certificación del clúster, frase de contraseña de configuración de cifrado de secretos, etc.) y descifrarlo, sin tener que conocer el valor del token. Este problema afecta a: SUSE Rancher K3s versión v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 y versiones anteriores; RKE2 versión v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 y versiones anteriores

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-03 CVE Reserved
  • 2021-07-28 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-311: Missing Encryption of Sensitive Data
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Suse
Search vendor "Suse"
Rancher K3s
Search vendor "Suse" for product "Rancher K3s"
1.19.12
Search vendor "Suse" for product "Rancher K3s" and version "1.19.12"
-
Affected
Suse
Search vendor "Suse"
Rancher K3s
Search vendor "Suse" for product "Rancher K3s"
1.20.8
Search vendor "Suse" for product "Rancher K3s" and version "1.20.8"
-
Affected
Suse
Search vendor "Suse"
Rancher K3s
Search vendor "Suse" for product "Rancher K3s"
1.21.2
Search vendor "Suse" for product "Rancher K3s" and version "1.21.2"
-
Affected
Suse
Search vendor "Suse"
Rancher Rke2
Search vendor "Suse" for product "Rancher Rke2"
1.19.12
Search vendor "Suse" for product "Rancher Rke2" and version "1.19.12"
-
Affected
Suse
Search vendor "Suse"
Rancher Rke2
Search vendor "Suse" for product "Rancher Rke2"
1.20.8
Search vendor "Suse" for product "Rancher Rke2" and version "1.20.8"
-
Affected
Suse
Search vendor "Suse"
Rancher Rke2
Search vendor "Suse" for product "Rancher Rke2"
1.21.2
Search vendor "Suse" for product "Rancher Rke2" and version "1.21.2"
-
Affected