CVE-2024-22030: Rancher agents can be hijacked by taking over the Rancher Server URL
(updated )
A vulnerability has been identified within Rancher that can be exploited in narrow circumstances through a man-in-the-middle (MITM) attack. An attacker would need to have control of an expired domain or execute a DNS spoofing/hijacking attack against the domain to exploit this vulnerability. The targeted domain is the one used as the Rancher URL.
SUSE is unaware of any successful exploitation of this vulnerability, which has a high complexity bar.
Please consult the associated MITRE ATT&CK - Technique - Adversary-in-the-Middle for further information about this attack category.
References
- bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22030
- github.com/advisories/GHSA-h4h5-9833-v2p4
- github.com/rancher/rancher
- github.com/rancher/rancher/security/advisories/GHSA-h4h5-9833-v2p4
- github.com/rancherlabs/support-tools/tree/master/windows-agent-strict-verify
- nvd.nist.gov/vuln/detail/CVE-2024-22030
- pkg.go.dev/vuln/GO-2024-3161
- ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-references/tls-settings
Detect and mitigate CVE-2024-22030 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →