<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Harvester — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/harvester/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/harvester/feed.xml" rel="self" type="application/rss+xml"/><item><title>SUSE Harvester Rancher Integration Vulnerable to MITM and DOS</title><link>https://feed.craftedsignal.io/briefs/2024-01-harvester-rancher-mitm/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-harvester-rancher-mitm/</guid><description>SUSE Harvester's Rancher integration mechanism is vulnerable to a man-in-the-middle attack due to insecure TLS options, potentially leading to denial of service.</description><content:encoded><![CDATA[<p>SUSE Harvester, a hyperconverged infrastructure (HCI) solution, integrates with Rancher to manage Kubernetes clusters. A vulnerability exists in the cluster registration process. The registration client, responsible for establishing communication between Harvester and Rancher, uses an insecure TLS configuration by default, failing to validate the remote server&rsquo;s certificate. This vulnerability, discovered in versions prior to 1.8.0, allows an attacker with network-level access to intercept and manipulate the TLS handshake, potentially redirecting cluster registration requests to a malicious server. Successful exploitation can result in unauthorized access and control over the Harvester cluster or lead to a denial of service condition due to a memory buffer overflow when processing unvalidated response payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network-level access between the SUSE Virtualization instance and the Rancher Manager.</li>
<li>The Harvester registration client attempts to establish a TLS connection with the Rancher Manager using the insecure default configuration.</li>
<li>Attacker intercepts the TLS handshake.</li>
<li>Attacker presents a fraudulent certificate to the Harvester registration client. Due to the lack of certificate validation, the client accepts the certificate.</li>
<li>The Harvester registration client sends cluster registration requests to the attacker-controlled server.</li>
<li>Attacker&rsquo;s server sends a crafted response payload back to the Harvester registration client.</li>
<li>The Harvester registration client processes the response payload without proper size validation.</li>
<li>A memory buffer overflow occurs, leading to a crash of the SUSE Virtualization registration controller, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to perform a man-in-the-middle attack and potentially gain unauthorized access to the SUSE Harvester cluster. Furthermore, the vulnerability can be exploited to cause a denial-of-service condition by crashing the SUSE Virtualization registration controller. While the exact number of affected installations is unknown, organizations using SUSE Harvester versions prior to 1.8.0 are at risk. Sectors commonly using virtualization technologies, such as cloud service providers, financial institutions, and research organizations, are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SUSE Virtualization to version 1.8.0 or later to patch the vulnerability as recommended by the vendor.</li>
<li>As a workaround, restrict access to the <code>cluster-registration-url</code> setting to authorized cluster administrators.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>mitm</category><category>denial-of-service</category><category>virtualization</category></item></channel></rss>