High severity8.0NVD Advisory· Published Oct 16, 2024· Updated Apr 15, 2026
CVE-2024-22030
CVE-2024-22030
Description
A vulnerability has been identified within Rancher that can be exploited in narrow circumstances through a man-in-the-middle (MITM) attack. An attacker would need to have control of an expired domain or execute a DNS spoofing/hijacking attack against the domain to exploit this vulnerability. The targeted domain is the one used as the Rancher URL.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/rancher/rancherGo | >= 2.7.0, < 2.7.15 | 2.7.15 |
github.com/rancher/rancherGo | >= 2.8.0, < 2.8.8 | 2.8.8 |
github.com/rancher/rancherGo | >= 2.9.0, < 2.9.2 | 2.9.2 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-h4h5-9833-v2p4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-22030ghsaADVISORY
- bugzilla.suse.com/show_bug.cginvdWEB
- github.com/rancher/rancher/security/advisories/GHSA-h4h5-9833-v2p4nvdWEB
- github.com/rancherlabs/support-tools/tree/master/windows-agent-strict-verifyghsaWEB
- pkg.go.dev/vuln/GO-2024-3161ghsaWEB
- ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-references/tls-settingsghsaWEB
News mentions
0No linked articles in our index yet.