CVE-2025-46811
SUSE · SUSE Manager
A critical vulnerability has been identified in SUSE Manager, assigned a CVSS score of 9.8.
Executive summary
A critical vulnerability has been identified in SUSE Manager, assigned a CVSS score of 9.8. This flaw allows an unauthenticated attacker with network access to the server to execute arbitrary commands with the highest privileges (root). Successful exploitation would result in a complete compromise of the SUSE Manager server, potentially leading to a widespread compromise of all managed systems within the environment.
Vulnerability
The vulnerability is a Missing Authentication for Critical Function (CWE-306). A specific websocket endpoint, /rhn/websocket/minion/remote-commands, does not enforce any authentication, allowing any user with network access to connect to it. An attacker can establish a connection to this websocket and send specially crafted messages to execute arbitrary commands on the underlying server. These commands are executed with root privileges, granting the attacker complete control over the SUSE Manager system.
Business impact
This vulnerability is of critical severity with a CVSS score of 9.8. A successful exploit grants an attacker full administrative control over the SUSE Manager server. As SUSE Manager is a centralized infrastructure management tool, its compromise could lead to a catastrophic, enterprise-wide security breach. An attacker could leverage this access to deploy malware, exfiltrate sensitive data, or move laterally to compromise all client systems (minions) managed by the server, leading to significant data loss, operational disruption, and reputational damage.
Remediation
Immediate Action: Immediately apply the security patches provided by the vendor to update all affected SUSE Manager instances to the latest version. After patching, it is crucial to monitor for any signs of post-remediation exploitation attempts and thoroughly review historical access logs for indicators of a prior compromise.
Proactive Monitoring:
- Network Traffic: Monitor and alert on any unauthorized or anomalous connections to the
/rhn/websocket/minion/remote-commandsendpoint from untrusted IP addresses or subnets. - Web Server Logs: Review logs for HTTP requests upgrading to the websocket protocol (HTTP 101 status code) targeting the vulnerable path.
- System Auditing: Monitor for unexpected processes spawned by the user account running the SUSE Manager service. Check for unusual shell commands, file modifications, or network connections originating from the server.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
- Network Segmentation: Use a firewall to strictly limit access to the SUSE Manager web interface and its associated ports. Only allow connections from a dedicated and trusted administrative network zone.
- Web Application Firewall (WAF): Deploy a WAF with a specific rule to block or alert on any access attempts to the
/rhn/websocket/minion/remote-commandspath. - Service Restriction: If business impact is acceptable, consider temporarily stopping the SUSE Manager service until patching can be completed.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a critical and immediate threat to the organization. Due to the CVSS score of 9.8 and the risk of complete infrastructure compromise, immediate action is required. We strongly recommend prioritizing the deployment of vendor-supplied patches to all affected SUSE Manager instances without delay. Although this CVE is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion. Organizations must assume it will be actively exploited and apply the recommended remediation and monitoring controls immediately.