Vulnerabilities (CVE)

Filtered by vendor Rancher Subscribe
Filtered by product Rancher
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-25320 1 Rancher 1 Rancher 2021-08-05 4.0 MEDIUM 9.9 CRITICAL
A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This issue affects: Rancher versions prior to 2.5.9; Rancher versions prior to 2.4.16.
CVE-2019-11202 1 Rancher 1 Rancher 2020-08-24 7.5 HIGH 9.8 CRITICAL
An issue was discovered that affects the following versions of Rancher: v2.0.0 through v2.0.13, v2.1.0 through v2.1.8, and v2.2.0 through 2.2.1. When Rancher starts for the first time, it creates a default admin user with a well-known password. After initial setup, the Rancher administrator may choose to delete this default admin user. If Rancher is restarted, the default admin user will be recreated with the well-known default password. An attacker could exploit this by logging in with the default admin credentials. This can be mitigated by deactivating the default admin user rather than completing deleting them.