HomeSuseCVE-2025-67601

CVE-2025-67601

HIGH
8.3CVSS
Published: 2026-02-25
Updated: 2026-03-03
AI Analysis

Description

A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-295

Metadata

Primary Vendor
SUSE
Published
2/25/2026
Last Modified
3/3/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

suse : ranchersuse : ranchersuse : ranchersuse : rancher

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-67601 | HIGH Severity | CVEDatabase.com | CVEDatabase.com