Harvester's SUSE Virtualization Registration Client Vulnerable to MITM and DOS
Description
Impact
A vulnerability has been identified in the SUSE Virtualization (Harvester) Rancher integration mechanism where by default the registration client uses an insecure TLS option that fails to verify the remote server’s certificate. This security gap could allow the execution of a man-in-the-middle (MitM) attack against SUSE Virtualization.
An attacker with network-level access between the SUSE Virtualization and Rancher Manager could interfere with the TLS handshake and abuse it to bypass TLS as a security control. The registration client could be misled to send cluster registration requests to an impersonated remote service. Additionally, because the system processes response payloads without performing size validation, an attacker could induce a memory buffer overflow, leading to a potential crash of the SUSE Virtualization registration controller.
Note that this vulnerability only affects the cluster registration configuration (the cluster-registration-url setting) which is distinct from the secured configuration used to maintain operational connectivity between SUSE Virtualization and Rancher Manager, as well as between the manager and hosted downstream clusters.
Please consult the associated MITRE ATT&CK - Technique - Adversary-in-the-Middle and MITRE ATT&CK - Technique - Endpoint Denial of Service: Application or System Exploitation for further information about this category of attack.
Patches
This vulnerability is addressed by updating the registration client’s default behaviour to validate the certificate presented by the remote server against the list of trusted system root certificate authority (CA) and those defined by the additional-ca setting.
Patched versions of SUSE Virtualization include releases v1.8.0 or newer.
Workarounds
If developers can't upgrade to a fixed version, ensure that only authorized cluster administrators can access and modify the cluster-registration-url setting.
Resources
If there are any questions or comments about this advisory: * Reach out to the SUSE Rancher Security team for security related inquiries. * Open an issue in the Rancher repository. * Verify with SUSE support matrix and product support lifecycle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/harvester/harvesterGo | < 1.8.0 | 1.8.0 |
Affected products
2- Range: <1.8.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
9- Gremlin Stealer Evolves into Modular Threat with Advanced Evasion CapabilitiesInfosecurity Magazine · May 15, 2026
- Gremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource FilesUnit 42 · May 15, 2026
- Quasar Linux RAT Steals Developer Credentials for Software Supply Chain CompromiseThe Hacker News · May 8, 2026
- Attackers adopt JavaScript runtime Bun to spread NWHStealerMalwarebytes Labs · May 6, 2026
- ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More StoriesThe Hacker News · Apr 30, 2026
- New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATsThe Hacker News · Apr 29, 2026
- Vidar Rises to Top of Chaotic Infostealer MarketDark Reading · Apr 28, 2026
- Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain CampaignThe Hacker News · Apr 23, 2026
- New Phishing Platform Used in Credential Theft Campaigns Against C-Suite ExecsInfosecurity Magazine · Apr 3, 2026