CVE-2023-32198
March 18, 2026
Impact A vulnerability has been identified in Steve where by default it was using an insecure option that did not validate the certificate presented by the remote server while performing a TLS connection. This could allow the execution of a man-in-the-middle (MitM) attack against services using Steve. For example, Rancher relies on Steve as a dependency for its user interface (UI) to proxy requests to Kubernetes clusters. Users who have the permission to create a service in Rancher’s local cluster can take over Rancher’s UI and display their own UI to gather sensitive information. This is only possible when the setting "ui-offline-preferred" is manually set to "remote" (by default Rancher sets it to "dynamic"). This enables further attacks such as cross-site scripting (XSS), or tampering the UI to collect passwords from other users etc. Please consult the associated "MITRE ATT&CK - Technique - Adversary-in-the-Middle" (https://attack.mitre.org/techniques/T1557/) for further information about this category of attack. Patches Patched versions of Steve include releases "v0.2.1", "v0.3.3", "v0.4.4" and "v0.5.13". This vulnerability is addressed by changing Steve to always verify a server’s certificate based on Go’s TLS settings. Workarounds If you can't upgrade to a fixed version, please make sure that you are only using Steve to connect to trusted servers. References If you have any questions or comments about this advisory: - Reach out to the "SUSE Rancher Security team" (https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the "Rancher" (https://github.com/rancher/rancher/issues/new/choose) repository. - Verify with our "support matrix" (https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and "product support lifecycle" (https://www.suse.com/lifecycle/).
Affected Packages
https://github.com/rancher/steve.git (GITHUB):
Affected version(s) >=v0.5.0 <v0.5.13Fix Suggestion:
Update to version v0.5.13https://github.com/rancher/steve.git (GITHUB):
Affected version(s) >=v0.3.0 <v0.3.3Fix Suggestion:
Update to version v0.3.3https://github.com/rancher/steve.git (GITHUB):
Affected version(s) >=v0.4.0 <v0.4.4Fix Suggestion:
Update to version v0.4.4https://github.com/rancher/steve.git (GITHUB):
Affected version(s) =v0.2.0 <v0.2.1Fix Suggestion:
Update to version v0.2.1github.com/rancher/steve (GO):
Affected version(s) >=v0.4.0 <v0.4.4Fix Suggestion:
Update to version v0.4.4github.com/rancher/steve (GO):
Affected version(s) =v0.2.0 <v0.2.1Fix Suggestion:
Update to version v0.2.1github.com/rancher/steve (GO):
Affected version(s) >=v0.3.0 <v0.3.3Fix Suggestion:
Update to version v0.3.3github.com/rancher/steve (GO):
Affected version(s) >=v0.5.0 <v0.5.13Fix Suggestion:
Update to version v0.5.13Related Resources (3)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.9
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
8
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Certificate Validation