CVE-2021-36784

7.2 HIGH

📋 TL;DR

This vulnerability allows users with the restricted-admin role in SUSE Rancher to escalate their privileges to full administrator access. It affects SUSE Rancher versions before 2.5.13 and Rancher versions before 2.6.4. This enables unauthorized administrative control over the Rancher management platform.

💻 Affected Systems

Products:
  • SUSE Rancher
  • Rancher
Versions: SUSE Rancher versions prior to 2.5.13; Rancher versions prior to 2.6.4
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where users have been assigned the restricted-admin role. The vulnerability is present in default configurations when this role is used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with restricted-admin access gains full administrative control over the Rancher cluster, allowing them to deploy malicious workloads, access sensitive data, modify configurations, and potentially compromise downstream Kubernetes clusters.

🟠

Likely Case

Malicious or compromised users with restricted-admin privileges escalate to full admin and gain unauthorized access to manage clusters, users, and resources within the Rancher environment.

🟢

If Mitigated

With proper role-based access controls and monitoring, the impact is limited to unauthorized administrative actions that can be detected and rolled back before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with restricted-admin privileges. The vulnerability involves improper privilege management that allows role escalation through normal administrative functions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SUSE Rancher 2.5.13 or Rancher 2.6.4

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1193991

Restart Required: Yes

Instructions:

1. Backup your Rancher configuration and data. 2. Upgrade to SUSE Rancher 2.5.13 or Rancher 2.6.4 using your preferred deployment method (Helm, Docker, RKE). 3. Restart Rancher services. 4. Verify the upgrade was successful.

🔧 Temporary Workarounds

Remove restricted-admin role assignments

linux

Temporarily remove the restricted-admin role from all users until patching can be completed

kubectl edit clusterrolebinding -n cattle-system
Remove restricted-admin role bindings

🧯 If You Can't Patch

  • Immediately audit and remove all restricted-admin role assignments from users
  • Implement strict monitoring and alerting for administrative actions by restricted-admin users

🔍 How to Verify

Check if Vulnerable:

Check Rancher version via UI (Settings -> About) or command line: kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}'

Check Version:

kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}' | grep -o 'v[0-9.]*'

Verify Fix Applied:

Verify version is 2.5.13 or higher for SUSE Rancher, or 2.6.4 or higher for Rancher. Test that restricted-admin users cannot perform full administrative actions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative actions by restricted-admin users
  • Role binding changes or privilege escalation attempts

Network Indicators:

  • Increased API calls to administrative endpoints from restricted-admin accounts

SIEM Query:

source="rancher" AND (event_type="role_escalation" OR user_role="restricted-admin" AND action="admin_operation")

🔗 References

📤 Share & Export