CVE-2024-22030Improper Certificate Validation in Rancher

Severity
8.0HIGHNVD
EPSS
0.1%
top 74.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16

Description

A vulnerability has been identified within Rancher that can be exploited in narrow circumstances through a man-in-the-middle (MITM) attack. An attacker would need to have control of an expired domain or execute a DNS spoofing/hijacking attack against the domain to exploit this vulnerability. The targeted domain is the one used as the Rancher URL.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.3 | Impact: 6.0

Affected Packages2 packages

CVEListV5suse/rancher2.7.02.7.15+2
Gogithub.com/rancher_rancher2.7.02.7.15+2

🔴Vulnerability Details

4
CVEList
Rancher agents can be hijacked by taking over the Rancher Server URL2024-10-16
OSV
Rancher agents can be hijacked by taking over the Rancher Server URL in github.com/rancher/rancher2024-10-09
OSV
Rancher agents can be hijacked by taking over the Rancher Server URL2024-09-26
GHSA
Rancher agents can be hijacked by taking over the Rancher Server URL2024-09-26
CVE-2024-22030 — Improper Certificate Validation | cvebase