CVE-2025-67601

Medium
|4.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to potentially intercept and manipulate communications with Rancher Manager if a user logs in using self-signed certificates without properly specifying the CA certificate. This situation can occur when the user uses a specific command flag that skips certificate verification, making it easier for attackers to exploit insecure connections.

Technical Description

A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References