Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account

SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account

Posted on September 29, 2025September 29, 2025 By CWS

A vital flaw in SUSE Rancher’s consumer administration module permits privileged customers to disrupt administrative entry by modifying usernames of different accounts. 

Tracked as CVE-2024-58260, this vulnerability impacts Rancher Supervisor variations 2.9.0 by 2.12.1, enabling each username takeover and full lockout of the admin account. 

Organizations working unsupported variations are urged to improve instantly or apply mitigations to forestall unauthorized disruption of cluster administration.

Rancher RBAC Privilege Escalation

Rancher’s RBAC system depends on distinctive usernames at login time, however fails to implement immutability of this discipline after account creation.

An attacker with replace permissions on any consumer useful resource can ship a crafted request to alter the username discipline of a goal account. 

When the admin account is focused, the attacker’s new, distinctive identifier takes priority, and the unique admin consumer can now not authenticate.Instance exploit request utilizing Rancher’s API:

This payload renames the admin account, rendering the real administrator unable to log in. The flaw additionally permits arbitrary renaming of any consumer, resulting in consumer takeover by assigning a high-privilege username to a malicious account.

Threat FactorsDetailsAffected ProductsRancher Supervisor v2.9.0–v2.9.11 v2.10.0–v2.10.9v2.11.0–v2.11.5v2.12.0–v2.12.1Impact– Account lockout: prevents admin/UI loginExploit Stipulations– Legitimate Rancher account with replace permission on Consumer APICVSS 3.1 Score7.6 (Excessive)

Mitigations

SUSE Rancher has launched patched variations that implement server-side validation on the .username discipline. 

As soon as set, usernames are immutable, stopping subsequent modification makes an attempt. Affected variations and their patched counterparts embody:

2.12.0–2.12.1 → 2.12.2

2.11.0–2.11.5 → 2.11.6

2.10.0–2.10.9 → 2.10.10

2.9.0–2.9.11 → 2.9.12

To improve, run:

For environments the place fast upgrading isn’t doable, directors ought to audit RBAC insurance policies to restrict replace permissions on consumer sources to solely totally trusted operators. 

Moreover, allow detailed audit logging to detect and reply to suspicious PUT /v3/customers API calls.

By addressing this high-severity situation, organizations shield the integrity of their Rancher UI and stop potential denial-of-service in opposition to vital administrative accounts. 

Steady monitoring of worldwide RBAC settings and immediate adoption of safety patches stay important greatest practices for securing container administration platforms.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Account, Administrators, Attackers, Lockout, Rancher, SUSE, Vulnerabilities

Post navigation

Previous Post: SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding
Next Post: WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File

Related Posts

Authorities Arrested Admins Of “LockerGoga,” “MegaCortex,” And “Nefilim” Ransomware Gands Authorities Arrested Admins Of “LockerGoga,” “MegaCortex,” And “Nefilim” Ransomware Gands Cyber Security News
Apache Tomcat Security Flaw Allows Constraint Bypass Apache Tomcat Security Flaw Allows Constraint Bypass Cyber Security News
Tenable, Qualys, Workday Data Breaches and Security Updates Tenable, Qualys, Workday Data Breaches and Security Updates Cyber Security News
LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft Cyber Security News
APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials Cyber Security News
BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark