Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2023-32197

CVE-2023-32197: Rancher allows privilege escalation in Windows nodes due to Insecure Access Control Lists

October 25, 2024 (updated April 16, 2025)

A vulnerability has been identified whereby Rancher Manager deployments containing Windows nodes have weak Access Control Lists (ACL), allowing BUILTIN\Users or NT AUTHORITY\Authenticated Users to view or edit sensitive files which could lead to privilege escalation.

The affected files include binaries, scripts, configuration and log files:

C:\etc\rancher\wins\config
C:\var\lib\rancher\agent\rancher2_connection_info.json
 C:\etc\rancher\rke2\config.yaml.d\50-rancher.yaml
C:\var\lib\rancher\agent\applied\*-*-applied.plan
 C:\usr\local\bin\rke2
C:\var\lib\rancher\capr\idempotence\idempotent.sh

RKE2 nodes expand the list to include the files below:

C:\etc\rancher\node\password
 C:\var\lib\rancher\rke2\agent\logs\kubelet.log
C:\var\lib\rancher\rke2\data\v1.**.**-rke2r*-windows-amd64-*\bin\*
 C:\var\lib\rancher\rke2\bin\*

This vulnerability is exclusive to deployments that contain Windows nodes. Linux-only environments are not affected by it.

Please consult the associated MITRE ATT&CK - Technique - Exploitation for Privilege Escalation for further information about this category of attack.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32197
  • github.com/advisories/GHSA-7h8m-pvw3-5gh4
  • github.com/rancher/rancher
  • github.com/rancher/rancher/security/advisories/GHSA-64jq-m7rq-768h
  • github.com/rancher/rancher/security/advisories/GHSA-7h8m-pvw3-5gh4
  • nvd.nist.gov/vuln/detail/CVE-2023-32197

Code Behaviors & Features

Detect and mitigate CVE-2023-32197 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.7.0 before 2.8.9, all versions starting from 2.9.0 before 2.9.3

Fixed versions

  • 2.8.9
  • 2.9.3

Solution

Upgrade to versions 2.8.9, 2.9.3 or above.

Impact 6.6 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-269: Improper Privilege Management
  • CWE-732: Incorrect Permission Assignment for Critical Resource

Source file

go/github.com/rancher/rancher/CVE-2023-32197.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:33 +0000.