A vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the chroot
jail and gain root access to the Rancher container itself. In
production environments, further privilege escalation is possible based
on living off the land within the Rancher container itself. For the test
and development environments, based on a –privileged Docker container,
it is possible to escape the Docker container and gain execution access
on the host system.
This issue affects rancher: from 2.7.0 before 2.7.16, from 2.8.0 before 2.8.9, from 2.9.0 before 2.9.3.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Apr 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the chroot jail and gain root access to the Rancher container itself. In production environments, further privilege escalation is possible based on living off the land within the Rancher container itself. For the test and development environments, based on a –privileged Docker container, it is possible to escape the Docker container and gain execution access on the host system. This issue affects rancher: from 2.7.0 before 2.7.16, from 2.8.0 before 2.8.9, from 2.9.0 before 2.9.3. | |
Title | Rancher Remote Code Execution via Cluster/Node Drivers | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: suse
Published:
Updated: 2025-04-18T03:55:40.915Z
Reserved: 2024-01-04T12:38:34.025Z
Link: CVE-2024-22036

Updated: 2025-04-16T14:22:53.637Z

Status : Awaiting Analysis
Published: 2025-04-16T09:15:27.300
Modified: 2025-04-16T13:25:37.340
Link: CVE-2024-22036

No data.