CVE-2025-67601
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to potentially intercept and manipulate communications with Rancher Manager if a user logs in using self-signed certificates without properly specifying the CA certificate. This situation can occur when the user uses a specific command flag that skips certificate verification, making it easier for attackers to exploit insecure connections.
Technical Description
A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 25, 2026
about 1 month ago
Last Modified
Mar 3, 2026
about 1 month ago
Vendor
suse
Product
rancher