CVE-2022-43757
📋 TL;DR
CVE-2022-43757 is a cleartext storage vulnerability in SUSE Rancher that allows users on managed clusters to access sensitive credentials stored without encryption. This affects Rancher administrators and users with cluster access, potentially exposing authentication tokens, API keys, or other credentials stored in the system.
💻 Affected Systems
- SUSE Rancher
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative credentials and completely compromise the Rancher environment, leading to full cluster takeover, data exfiltration, and lateral movement to connected systems.
Likely Case
Privileged users or attackers with initial access can extract credentials for downstream systems, enabling unauthorized access to managed Kubernetes clusters and cloud resources.
If Mitigated
With proper network segmentation and least privilege access, impact is limited to credential exposure within the compromised cluster without enabling broader system compromise.
🎯 Exploit Status
Exploitation requires authenticated access to Rancher, but once authenticated, accessing cleartext credentials is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Rancher 2.5.17, 2.6.10, or 2.7.1
Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1205295
Restart Required: Yes
Instructions:
1. Backup your Rancher configuration and data. 2. Update Rancher to version 2.5.17, 2.6.10, or 2.7.1 depending on your current version track. 3. Restart Rancher services. 4. Verify the update was successful.
🔧 Temporary Workarounds
Restrict Access to Rancher API
linuxLimit network access to Rancher management interface and API endpoints to only trusted administrators.
# Configure firewall rules to restrict access
iptables -A INPUT -p tcp --dport 443 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Rancher management plane from production workloads
- Rotate all credentials stored in Rancher and implement credential management with external secret stores
🔍 How to Verify
Check if Vulnerable:
Check Rancher version via UI or API. Versions below 2.5.17, 2.6.10, or 2.7.1 are vulnerable.
Check Version:
kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}' | grep -o 'rancher/rancher:v[0-9.]*'
Verify Fix Applied:
Confirm Rancher version is 2.5.17, 2.6.10, or 2.7.1 or higher, and verify credential storage is encrypted in logs and storage.
📡 Detection & Monitoring
Log Indicators:
- Unusual API access patterns to credential endpoints
- Multiple failed authentication attempts followed by credential access
Network Indicators:
- Unexpected outbound connections from Rancher nodes to external systems using extracted credentials
SIEM Query:
source="rancher" AND (event="credential_access" OR event="sensitive_data_exposure")