CVE-2023-32199
BaseFortify
Publication date: 2025-10-29
Last updated on: 2025-10-30
Assigner: SUSE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rancher | rancher | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-281 | The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Rancher Manager allows a user to retain administrative access to clusters even after a custom GlobalRole with administrative permissions or its binding has been removed. It specifically affects custom GlobalRoles that have wildcard (*) rules for resources or non-resource URLs, meaning the removal of these roles does not properly revoke the user's access.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized continued access to clusters by users who should have had their administrative permissions revoked. This can result in potential unauthorized actions, data exposure, or changes within the clusters, posing security risks.