CVE-2021-25320Improper Access Control in Rancher

Severity
9.9CRITICALNVD
EPSS
0.2%
top 57.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 15
Latest updateMar 10

Description

A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This issue affects: Rancher versions prior to 2.5.9; Rancher versions prior to 2.4.16.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Affected Packages3 packages

CVEListV5rancher/rancherRancher2.5.9+1
NVDrancher/rancher2.5.02.5.9+1
Gogithub.com/rancher_rancher2.2.02.4.16+2

🔴Vulnerability Details

4
OSV
Rancher cloud credentials can be used through proxy API by users without access in github.com/rancher/rancher2026-03-10
GHSA
Rancher cloud credentials can be used through proxy API by users without access2026-03-03
OSV
Rancher cloud credentials can be used through proxy API by users without access2026-03-03
CVEList
Rancher: Cloud credentials can be used through proxy API by users without access2021-07-15
CVE-2021-25320 — Improper Access Control in Rancher | cvebase