CVE-2026-41050

Rancher (Fleet) · Fleet

The Fleet Helm deployer improperly handles ServiceAccount impersonation, allowing unauthorized access to secrets across Kubernetes namespaces.

Executive summary

A critical authorization vulnerability in Rancher Fleet allows tenants to read unauthorized secrets from any namespace in a downstream cluster.

Vulnerability

Fleet’s Helm deployer fails to fully apply ServiceAccount impersonation in specific code paths. This allows a tenant with git push access to read secrets from any namespace on target downstream clusters.

Business impact

The CVSS score of 9.9 indicates a massive risk to Kubernetes cluster security. Unauthorized access to secrets can lead to the exposure of credentials, API keys, and sensitive configuration data, effectively granting the attacker control over the entire cluster environment.

Remediation

Immediate Action: Update the Fleet controller and agent components to the latest version recommended by Rancher.

Proactive Monitoring: Review Kubernetes audit logs for suspicious get requests on secrets resources by unauthorized ServiceAccounts or users.

Compensating Controls: Implement Kubernetes RBAC policies to strictly limit the permissions of ServiceAccounts used by Fleet and ensure that sensitive secrets are encrypted at rest.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

This vulnerability is highly critical for organizations using Fleet for GitOps in Kubernetes. Immediate patching is necessary to prevent potential lateral movement and secret theft within clusters.