We found results for “”
CVE-2025-67601
Good to know:
Date: February 3, 2026
Impact A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the "-skip-verify" flag to the Rancher CLI login command without also passing the "–cacert" flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts. This does not apply to any other commands and only applies to the login command if the "–cacert" flag was not provided. An attacker with network-level access between the Rancher CLI and Rancher Manager could interfere with the TLS handshake to return a CA they control, despite the use of the "--skip-verify" flag. This may be abused to bypass TLS as a security control. Attackers can also see basic authentication headers in a Man-in-the-Middle due to the lack of TLS enforcement. Please consult the associated "MITRE ATT&CK - Technique - Man-in-the-Middle" (https://attack.mitre.org/techniques/T1557/) for further information about this category of attack. Patches This vulnerability is addressed by removing the ability to fetch CA certificates stored in Rancher’s setting cacerts when using the login command. Whenever required, for example when using self-signed certificates, CA certificates have to be explicitly passed with the –cacert flag. Patched versions of Rancher include releases "v2.13.2", "v2.12.6", "v2.11.10", and "v2.10.11". Workarounds If a projecct can't upgrade to a fixed version, please make sure whenever required, for example when using self-signed certificates, to always explicitly pass CA certificates with the –cacert flag when using the login command. References If there are any questions or comments about this advisory: - Reach out to the "SUSE Rancher Security team" (https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the "Rancher" (https://github.com/rancher/rancher/issues/new/choose) repository. - Verify with the "support matrix" (https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and "product support lifecycle" (https://www.suse.com/lifecycle/). Note: Rancher versions beyond 2.3.0-alpha5 are no longer supported at pkg.go.dev, follow "Rancher installation instructions for newer versions" (https://ranchermanager.docs.rancher.com/v2.13/getting-started/installation-and-upgrade).
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Certificate Validation
CWE-295Top Fix
Upgrade Version
Upgrade to version github.com/rancher/rancher - v2.13.2;github.com/rancher/rancher - v2.12.6;github.com/rancher/rancher - v2.11.10;github.com/rancher/rancher - v2.10.11;https://github.com/rancher/cli.git - v2.13.2;https://github.com/rancher/cli.git - v2.12.6;https://github.com/rancher/cli.git - v2.11.10;https://github.com/rancher/cli.git - v2.10.11
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


