{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T15:52:49.798","vulnerabilities":[{"cve":{"id":"CVE-2021-36783","sourceIdentifier":"meissner@suse.de","published":"2022-09-07T09:15:08.600","lastModified":"2024-11-21T06:14:05.463","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Insufficiently Protected Credentials vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners and Project Members to read credentials, passwords and API tokens that have been stored in cleartext and exposed via API endpoints. This issue affects: SUSE Rancher Rancher versions prior to 2.6.4; Rancher versions prior to 2.5.13."},{"lang":"es","value":"Una vulnerabilidad de credenciales insuficientemente protegidas en SUSE Rancher permite a los propietarios de clústeres, miembros de clústeres, propietarios de proyectos y miembros de proyectos autenticados leer credenciales, contraseñas y tokens de API que se han almacenado en texto claro y se han expuesto a través de puntos finales de API. Este problema afecta a: Las versiones de SUSE Rancher anteriores a la 2.6.4; las versiones de Rancher anteriores a la 2.5.13"}],"metrics":{"cvssMetricV31":[{"source":"meissner@suse.de","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}]},"weaknesses":[{"source":"meissner@suse.de","type":"Secondary","description":[{"lang":"en","value":"CWE-522"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*","versionStartIncluding":"2.5.0","versionEndExcluding":"2.5.13","matchCriteriaId":"888F5175-6FF0-4846-93AF-0C8A5EEA8258"},{"vulnerable":true,"criteria":"cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.0","versionEndExcluding":"2.6.4","matchCriteriaId":"E7C8176B-46C4-46C9-9909-5937C13FEB3C"}]}]}],"references":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1193990","source":"meissner@suse.de","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/rancher/rancher/security/advisories/GHSA-8w87-58w6-hfv8","source":"meissner@suse.de","tags":["Third Party Advisory"]},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1193990","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/rancher/rancher/security/advisories/GHSA-8w87-58w6-hfv8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}