CVE-2022-43759

7.2 HIGH

📋 TL;DR

This vulnerability in SUSE Rancher allows authenticated users with 'escalate' permissions on PRTBs (Project Role Template Bindings) to escalate their privileges for any promoted resource across any cluster. This affects Rancher deployments where users have been granted escalate permissions, potentially enabling unauthorized access to sensitive resources. The issue impacts SUSE Rancher versions before 2.5.17 and 2.6.10.

💻 Affected Systems

Products:
  • SUSE Rancher
Versions: Rancher versions prior to 2.5.17; Rancher versions prior to 2.6.10
Operating Systems: Any OS running Rancher
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when users have been granted 'escalate' verb permissions on PRTBs. Default configurations may not grant these permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with escalate permissions could gain administrative control over any cluster managed by Rancher, potentially compromising all workloads, data, and infrastructure.

🟠

Likely Case

Privileged users could unintentionally or maliciously elevate their permissions beyond intended scope, leading to unauthorized access to sensitive resources across clusters.

🟢

If Mitigated

With proper RBAC controls limiting escalate permissions to trusted administrators only, the impact is reduced to authorized users potentially misusing legitimate permissions.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing Rancher instances increase attack surface for credential-based attacks.
🏢 Internal Only: HIGH - Internal users with escalate permissions could exploit this to gain unauthorized cluster access, especially in multi-tenant environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with escalate permissions. The vulnerability is in authorization logic, making exploitation straightforward for users with the required permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Rancher 2.5.17 or 2.6.10

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1205293

Restart Required: Yes

Instructions:

1. Backup your Rancher configuration and data. 2. Upgrade to Rancher 2.5.17 if using 2.5.x series. 3. Upgrade to Rancher 2.6.10 if using 2.6.x series. 4. Restart Rancher services. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Remove Escalate Permissions

linux

Temporarily remove 'escalate' verb permissions from all PRTBs until patching can be completed.

kubectl edit clusterrolebinding <binding-name>
Remove 'escalate' from verbs in rules

Restrict User Access

all

Review and restrict user access to only necessary permissions, particularly limiting escalate verb usage.

Review RBAC configurations in Rancher UI or via kubectl

🧯 If You Can't Patch

  • Implement strict RBAC controls to limit escalate permissions to absolute minimum required users
  • Enable audit logging for all privilege escalation attempts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Rancher version: kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}' | grep -o 'rancher/rancher:[0-9.]*'

Check Version:

kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[0].spec.containers[0].image}'

Verify Fix Applied:

Verify version is 2.5.17 or higher for 2.5.x series, or 2.6.10 or higher for 2.6.x series using the same command

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized privilege escalation attempts in Rancher audit logs
  • Unexpected permission changes for users with escalate verb

Network Indicators:

  • Unusual API calls to Rancher authorization endpoints from non-admin users

SIEM Query:

source="rancher-audit" AND (event="escalate" OR verb="escalate") AND user!="admin"

🔗 References

📤 Share & Export