Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-67601

Rancher CLI skips TLS verification on Rancher CLI login command
Back to all
CVE

CVE-2025-67601

Rancher CLI skips TLS verification on Rancher CLI login command

Impact

A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts. This does not apply to any other commands and only applies to the login command if the –cacert flag was not provided.

An attacker with network-level access between the Rancher CLI and Rancher Manager could interfere with the TLS handshake to return a CA they control, despite the use of the --skip-verify flag. This may be abused to bypass TLS as a security control. Attackers can also see basic authentication headers in a Man-in-the-Middle due to the lack of TLS enforcement.

Please consult the associated MITRE ATT&CK - Technique - Man-in-the-Middle for further information about this category of attack.

Patches

This vulnerability is addressed by removing the ability to fetch CA certificates stored in Rancher’s setting cacerts when using the login command. Whenever required, for example when using self-signed certificates, CA certificates have to be explicitly passed with the –cacert flag.

Patched versions of Rancher include releases v2.13.2v2.12.6v2.11.10, and v2.10.11.

Workarounds

If a projecct can't upgrade to a fixed version, please make sure whenever required, for example when using self-signed certificates, to always explicitly pass CA certificates with the –cacert flag when using the login command.

References

If there are any questions or comments about this advisory:

Note: Rancher versions beyond 2.3.0-alpha5 are no longer supported at pkg.go.dev, follow Rancher installation instructions for newer versions.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.3
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://github.com/rancher/rancher/security/advisories/GHSA-mc24-7m59-4q5p, https://nvd.nist.gov/vuln/detail/CVE-2025-67601, https://attack.mitre.org/techniques/T1557, https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-67601, https://github.com/rancher/rancher, https://github.com/rancher/rancher/releases/tag/v2.13.2

Severity

8.3

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8.3
EPSS Probability
0.00008%
EPSS Percentile
0.0074%
Introduced Version
0,2.13.0,2.12.0,2.11.0,2.10.0
Fix Available
0.0.0-20260129092249-bb0625fd1896,2.13.2,2.12.6,2.11.10,2.10.11

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading