{"api_version":"1","generated_at":"2026-04-22T23:09:08+00:00","cve":"CVE-2023-22648","urls":{"html":"https://cve.report/CVE-2023-22648","api":"https://cve.report/api/cve/CVE-2023-22648.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-22648","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-22648"},"summary":{"title":"CVE-2023-22648","description":"A Improper Privilege Management vulnerability in SUSE Rancher causes permission changes in Azure AD not to be reflected to users \nwhile they are logged in the Rancher UI. This would cause the users to \nretain their previous permissions in Rancher, even if they change groups\n on Azure AD, for example, to a lower privileged group, or are removed \nfrom a group, thus retaining their access to Rancher instead of losing \nit.\nThis issue affects Rancher: from >= 2.6.7 before < 2.6.13, from >= 2.7.0 before < 2.7.4.","state":"PUBLIC","assigner":"security@suse.com","published_at":"2023-06-01 13:15:00","updated_at":"2023-10-05 16:27:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22648","name":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22648","refsource":"MISC","tags":[],"title":"1210528 – (CVE-2023-22648) VUL-0: CVE-2023-22648: Rancher: Automatically Refreshing User Information not working properly external","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/rancher/rancher/security/advisories/GHSA-vf6j-6739-78m8","name":"https://github.com/rancher/rancher/security/advisories/GHSA-vf6j-6739-78m8","refsource":"MISC","tags":[],"title":"Azure AD permission changes are not reflected on active sessions · Advisory · rancher/rancher · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-22648","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22648","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"22648","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"rancher","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-22648","ASSIGNER":"security@suse.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A Improper Privilege Management vulnerability in SUSE Rancher causes permission changes in Azure AD not to be reflected to users \nwhile they are logged in the Rancher UI. This would cause the users to \nretain their previous permissions in Rancher, even if they change groups\n on Azure AD, for example, to a lower privileged group, or are removed \nfrom a group, thus retaining their access to Rancher instead of losing \nit.\nThis issue affects Rancher: from >= 2.6.7 before < 2.6.13, from >= 2.7.0 before < 2.7.4.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269: Improper Privilege Management","cweId":"CWE-269"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"SUSE","product":{"product_data":[{"product_name":"Rancher","version":{"version_data":[{"version_affected":"<","version_name":">= 2.6.7","version_value":"< 2.6.13"},{"version_affected":"<","version_name":">= 2.7.0","version_value":"< 2.7.4"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/rancher/rancher/security/advisories/GHSA-vf6j-6739-78m8","refsource":"MISC","name":"https://github.com/rancher/rancher/security/advisories/GHSA-vf6j-6739-78m8"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22648","refsource":"MISC","name":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22648"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"credits":[{"lang":"en","value":"https://github.com/yvespp"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-01 13:15:00","lastModifiedDate":"2023-10-05 16:27:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*","versionStartIncluding":"2.7.0","versionEndExcluding":"2.7.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.7","versionEndExcluding":"2.6.13","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}