CVE-2022-43757

9.9 CRITICAL

📋 TL;DR

CVE-2022-43757 is a cleartext storage vulnerability in SUSE Rancher that allows users on managed clusters to access sensitive credentials stored without encryption. This affects Rancher administrators and users with cluster access, potentially exposing authentication tokens, API keys, or other credentials stored in the system.

💻 Affected Systems

Products:
  • SUSE Rancher
Versions: Rancher versions prior to 2.5.17, versions prior to 2.6.10, versions prior to 2.7.1
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where sensitive information is stored in Rancher, particularly credentials for managed clusters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials and completely compromise the Rancher environment, leading to full cluster takeover, data exfiltration, and lateral movement to connected systems.

🟠

Likely Case

Privileged users or attackers with initial access can extract credentials for downstream systems, enabling unauthorized access to managed Kubernetes clusters and cloud resources.

🟢

If Mitigated

With proper network segmentation and least privilege access, impact is limited to credential exposure within the compromised cluster without enabling broader system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Rancher, but once authenticated, accessing cleartext credentials is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Rancher 2.5.17, 2.6.10, or 2.7.1

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1205295

Restart Required: Yes

Instructions:

1. Backup your Rancher configuration and data. 2. Update Rancher to version 2.5.17, 2.6.10, or 2.7.1 depending on your current version track. 3. Restart Rancher services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Access to Rancher API

linux

Limit network access to Rancher management interface and API endpoints to only trusted administrators.

# Configure firewall rules to restrict access
iptables -A INPUT -p tcp --dport 443 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Rancher management plane from production workloads
  • Rotate all credentials stored in Rancher and implement credential management with external secret stores

🔍 How to Verify

Check if Vulnerable:

Check Rancher version via UI or API. Versions below 2.5.17, 2.6.10, or 2.7.1 are vulnerable.

Check Version:

kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}' | grep -o 'rancher/rancher:v[0-9.]*'

Verify Fix Applied:

Confirm Rancher version is 2.5.17, 2.6.10, or 2.7.1 or higher, and verify credential storage is encrypted in logs and storage.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API access patterns to credential endpoints
  • Multiple failed authentication attempts followed by credential access

Network Indicators:

  • Unexpected outbound connections from Rancher nodes to external systems using extracted credentials

SIEM Query:

source="rancher" AND (event="credential_access" OR event="sensitive_data_exposure")

🔗 References

📤 Share & Export