- Description
- A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts.
- Source
- meissner@suse.de
- NVD status
- Analyzed
- Products
- rancher
CVSS 3.1
- Type
- Primary
- Base score
- 4.8
- Impact score
- 2.5
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
- Severity
- MEDIUM
- meissner@suse.de
- CWE-295
- Hype score
- Not currently trending
CVE-2025-67601 (CVSS:8.3, HIGH) is Undergoing Analysis. A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -ski..https://t.co/jmsBfxQmX1 #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
2 Mar 2026
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-67601 A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command… https://t.co/1Ook2ZHsi1
@CVEnew
25 Feb 2026
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-67601 Rancher Manager CLI Authentication Bypass via Self-Signed Certificate Handling https://t.co/yoOH9blkEX
@VulmonFeeds
25 Feb 2026
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
**CVE-2025-67601** pertains to a security flaw within Rancher Manager, an open-source platform for managing Kubernetes clusters. The vulnerability arises when users employ self-signed CA certificates and invoke the Rancher CLI login command with the `-skip-verify` flag
@CveTodo
25 Feb 2026
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8434BB27-8099-4685-9FE5-C3E4FF565E79",
"versionEndExcluding": "2.10.11",
"versionStartIncluding": "2.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7549C0-3315-469C-A43F-E8B7095E570D",
"versionEndExcluding": "2.11.10",
"versionStartIncluding": "2.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81C70333-B5C6-4DAB-92B0-0FA49ED9CBE7",
"versionEndExcluding": "2.12.6",
"versionStartIncluding": "2.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDEACDC9-6A42-488C-AD8B-46E1B26CA943",
"versionEndExcluding": "2.13.2",
"versionStartIncluding": "2.13.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]