CVE-2022-43755

7.1 HIGH

📋 TL;DR

CVE-2022-43755 is an insufficient entropy vulnerability in SUSE Rancher that allows attackers who have previously obtained a cattle-token to continue using it even after token renewal. This affects Rancher deployments where attackers have already compromised authentication tokens. The vulnerability impacts SUSE Rancher versions prior to 2.6.10 and versions prior to 2.7.1.

💻 Affected Systems

Products:
  • SUSE Rancher
Versions: Rancher versions prior to 2.6.10; Rancher versions prior to 2.7.1
Operating Systems: All platforms running Rancher
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where attackers have already obtained cattle-tokens through other means.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers maintain persistent access to Rancher management console and can escalate privileges, deploy malicious workloads, or exfiltrate sensitive cluster data even after token rotation attempts.

🟠

Likely Case

Previously compromised tokens remain valid, allowing attackers to maintain unauthorized access to Rancher management functions and potentially compromise Kubernetes clusters managed by Rancher.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Rancher management plane, but attackers could still manipulate cluster configurations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires prior token compromise; exploitation depends on attackers having obtained cattle-tokens through other vulnerabilities or credential theft.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Rancher 2.6.10 and Rancher 2.7.1

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1205297

Restart Required: Yes

Instructions:

1. Backup Rancher configuration and data. 2. Upgrade to Rancher 2.6.10 or 2.7.1 depending on your version track. 3. Restart Rancher services. 4. Verify all cattle-tokens have been properly invalidated and regenerated.

🔧 Temporary Workarounds

Manual Token Rotation

linux

Manually rotate all cattle-tokens and ensure old tokens are properly invalidated

kubectl delete secrets -n cattle-system --selector=app=cattle-token
Restart Rancher deployment to generate new tokens

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Rancher management plane from untrusted networks
  • Enable comprehensive audit logging and monitor for unusual token usage patterns

🔍 How to Verify

Check if Vulnerable:

Check Rancher version: kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}' | grep -E ':(2\.6\.([0-9]|9)|2\.7\.0)'

Check Version:

kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}'

Verify Fix Applied:

Verify version is 2.6.10 or higher for 2.6.x track, or 2.7.1 or higher for 2.7.x track

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication attempts with same token after rotation
  • Unusual API calls from previously compromised tokens

Network Indicators:

  • Unexpected Rancher API traffic from unauthorized sources

SIEM Query:

source="rancher" AND ("cattle-token" OR "authentication") AND ("failed" OR "invalid" OR "reused")

🔗 References

📤 Share & Export