Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-32001


K3s in SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup, to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc.) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions.


Published

2021-07-28T10:15:08.327

Last Modified

2024-11-21T06:06:41.367

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-311
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application suse rancher_k3s 1.19.12 Yes
Application suse rancher_k3s 1.20.8 Yes
Application suse rancher_k3s 1.21.2 Yes
Application suse rancher_rke2 1.19.12 Yes
Application suse rancher_rke2 1.20.8 Yes
Application suse rancher_rke2 1.21.2 Yes

References