First published: Wed May 25 2022(Updated: )
A Cleartext Transmission of Sensitive Information vulnerability in SUSE Rancher, Rancher allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden This issue affects: SUSE Rancher Rancher versions prior to 2.5.14; Rancher versions prior to 2.6.5.
Credit: meissner@suse.de meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Rancher | >=2.5.0<2.5.14 | |
SUSE Rancher | >=2.6.0<2.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21951 is a Cleartext Transmission of Sensitive Information vulnerability in SUSE Rancher, which allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden.
The severity of CVE-2022-21951 is medium, with a CVSS score of 6.8.
CVE-2022-21951 affects SUSE Rancher versions 2.5.0 to 2.5.14 and versions 2.6.0 to 2.6.5.
Yes, a fix is available for CVE-2022-21951. It is recommended to update SUSE Rancher to a patched version.
You can find more information about CVE-2022-21951 in the following references: [Bugzilla](https://bugzilla.suse.com/show_bug.cgi?id=1199443) and [GitHub Advisory](https://github.com/rancher/rancher/security/advisories/GHSA-vrph-m5jj-c46c).