CVE-2021-36775

8.8 HIGH

📋 TL;DR

CVE-2021-36775 is an improper access control vulnerability in SUSE Rancher that allows users to retain privileges after they should have been revoked. This affects Rancher installations where user permissions are managed through role-based access control. Organizations using vulnerable versions of Rancher for Kubernetes management are at risk.

💻 Affected Systems

Products:
  • SUSE Rancher
Versions: Rancher versions prior to 2.4.18, versions prior to 2.5.12, versions prior to 2.6.3
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All Rancher deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with previously revoked privileges could maintain persistent access to sensitive Kubernetes clusters, potentially leading to data exfiltration, resource hijacking, or complete cluster compromise.

🟠

Likely Case

Former administrators or users with elevated privileges could continue accessing resources they should no longer have permission to view or modify, violating security policies and compliance requirements.

🟢

If Mitigated

With proper network segmentation and monitoring, unauthorized access attempts could be detected and blocked before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has valid credentials that were previously revoked.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Rancher 2.4.18, 2.5.12, or 2.6.3

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1189120

Restart Required: Yes

Instructions:

1. Backup your Rancher configuration and data. 2. Upgrade to Rancher 2.4.18, 2.5.12, or 2.6.3 depending on your current version. 3. Restart Rancher services. 4. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Manual privilege verification and revocation

linux

Regularly audit and manually revoke privileges for all users, especially those who should no longer have access.

kubectl get clusterrolebindings
kubectl get rolebindings --all-namespaces
rancher users ls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Rancher management plane from production workloads
  • Enable comprehensive audit logging and implement real-time alerting for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Rancher version using: kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}'

Check Version:

kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}' | grep -o 'rancher/rancher:v[0-9.]*'

Verify Fix Applied:

Verify version is 2.4.18, 2.5.12, or 2.6.3 or higher, then test that revoked users cannot access previously granted resources.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected successful authentication from users who should be revoked
  • API calls from users with recently revoked privileges
  • Failed revocation attempts in audit logs

Network Indicators:

  • Unusual API traffic patterns from previously authorized IP addresses
  • Authentication requests from deprovisioned user accounts

SIEM Query:

source="rancher" AND (event="authentication_success" OR event="api_call") AND user IN [list_of_revoked_users]

🔗 References

📤 Share & Export