CVE-2025-46811

9.8 CRITICAL

📋 TL;DR

CVE-2025-46811 is a critical Missing Authorization vulnerability in SUSE Linux Manager that allows any user who can connect to port 443 of SUSE Manager to execute arbitrary commands as root on any managed client. This affects multiple SUSE Manager Server products and container images, potentially compromising entire managed environments.

💻 Affected Systems

Products:
  • SUSE Linux Manager
  • SUSE Manager Server Module 4.3
  • Container suse/manager/5.0/x86_64/server
  • Image SLES15-SP4-Manager-Server-4-3-BYOS
  • Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
  • Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
  • Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
Versions: Container: before 5.0.27-150600.3.33.1; Images and Module: before 4.3.87-150400.3.110.2
Operating Systems: SUSE Linux Enterprise Server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations where SUSE Manager is accessible on port 443. The vulnerability exists in the authorization mechanism between manager and clients.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all managed systems, data exfiltration, ransomware deployment, and persistent backdoor installation across the entire infrastructure.

🟠

Likely Case

Attackers gain root access to managed clients, allowing them to steal credentials, install malware, and pivot to other systems in the network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized connections to SUSE Manager.

🌐 Internet-Facing: HIGH - If SUSE Manager is exposed to the internet, attackers can remotely exploit this without authentication.
🏢 Internal Only: HIGH - Even internally, any user or compromised system with network access to port 443 can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to port 443 but no authentication. Exploitation is straightforward once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Container: 5.0.27-150600.3.33.1 or later; Images and Module: 4.3.87-150400.3.110.2 or later

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46811

Restart Required: Yes

Instructions:

1. Update SUSE Manager using 'zypper update' or appropriate package manager. 2. Verify the updated version. 3. Restart SUSE Manager services. 4. Test functionality with a non-privileged client.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to SUSE Manager port 443 to only trusted management networks and systems.

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Firewall Configuration

linux

Configure host-based firewall to only allow connections from authorized IP addresses.

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="443" accept'
firewall-cmd --reload

🧯 If You Can't Patch

  • Immediately restrict network access to SUSE Manager port 443 using firewall rules to only allow connections from authorized management systems.
  • Monitor network traffic to port 443 for suspicious activity and implement strict logging and alerting for any unauthorized connection attempts.

🔍 How to Verify

Check if Vulnerable:

Check current version: For containers: 'docker inspect CONTAINER_NAME | grep -i version'; For installed packages: 'rpm -qa | grep -i suse-manager'

Check Version:

rpm -q suse-manager-server

Verify Fix Applied:

Verify version is patched: Container should be 5.0.27-150600.3.33.1 or later; Other products should be 4.3.87-150400.3.110.2 or later

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to port 443
  • Unexpected command execution on managed clients
  • Authentication bypass logs in SUSE Manager

Network Indicators:

  • Unusual traffic patterns to SUSE Manager port 443 from unexpected sources
  • Command and control traffic from managed clients

SIEM Query:

source="suse_manager" AND (event_type="auth_failure" OR dest_port=443) AND src_ip NOT IN (trusted_ips)

🔗 References

📤 Share & Export