// For flags

CVE-2024-22032

Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec

Severity Score

7.1
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability has been identified in which an RKE1 cluster keeps
constantly reconciling when secrets encryption configuration is enabled.
When reconciling, the Kube API secret values are written in plaintext
on the AppliedSpec. Cluster owners, Cluster members, and Project members
(for projects within the cluster), all have RBAC permissions to view
the cluster object from the apiserver.

Se ha identificado una vulnerabilidad en la que un clúster RKE1 se reconcilia constantemente cuando se habilita la configuración de cifrado de secretos. Al realizar la conciliación, los valores secretos de la API de Kube se escriben en texto plano en AppliedSpec. Los propietarios del clúster, los miembros del clúster y los miembros del proyecto (para los proyectos dentro del clúster) tienen permisos RBAC para ver el objeto del clúster desde el servidor de API.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
None
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-01-04 CVE Reserved
  • 2024-10-16 CVE Published
  • 2024-10-16 CVE Updated
  • 2024-10-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
SUSE
Search vendor "SUSE"
Rancher
Search vendor "SUSE" for product "Rancher"
>= 2.7.0 < 2.7.14
Search vendor "SUSE" for product "Rancher" and version " >= 2.7.0 < 2.7.14"
en
Affected
SUSE
Search vendor "SUSE"
Rancher
Search vendor "SUSE" for product "Rancher"
>= 2.8.0 < 2.8.5
Search vendor "SUSE" for product "Rancher" and version " >= 2.8.0 < 2.8.5"
en
Affected