CVE-2023–32191: Why You Need to Patch Your Rancher Kubernetes Engine (RKE) NOW to Avoid Catastrophic Cloud Breaches!

Khaleel Khan
3 min readNov 9, 2024

A new vulnerability appears with a CVSS score of 10, it’s a five-alarm fire for IT and security teams. This is the case with CVE-2023–32191, a critical vulnerability that affects Rancher Kubernetes Engine (RKE) users. If unaddressed, this flaw can give attackers administrative control over your entire Kubernetes cluster — potentially leading to a devastating breach.

In this article, we’ll dive into what CVE-2023–32191 is, why it’s so dangerous, and, most importantly, how you can patch your systems right away. Don’t wait until it’s too late — this vulnerability requires immediate attention.

Understanding CVE-2023–32191: What’s at Stake?

CVE-2023–32191 is a high-severity security flaw in Rancher Kubernetes Engine (RKE), impacting the way RKE stores cluster state information. To manage this state, RKE uses a ConfigMap called full-cluster-state in the kube-system namespace. However, this ConfigMap stores sensitive credentials—essentially an all-access pass for anyone who gains read access to it.

Here’s a list of what’s stored in this vulnerable ConfigMap:

  • SSH credentials to Kubernetes nodes

--

--

Khaleel Khan
Khaleel Khan

Written by Khaleel Khan

Cybersecurity researcher with 18 years experience in state government, corporate sectors, and bug hunting enthusiast.

No responses yet