A vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the chroot
 jail and gain root access to the Rancher container itself. In 
production environments, further privilege escalation is possible based 
on living off the land within the Rancher container itself. For the test
 and development environments, based on a –privileged Docker container, 
it is possible to escape the Docker container and gain execution access 
on the host system.
This issue affects rancher: from 2.7.0 before 2.7.16, from 2.8.0 before 2.8.9, from 2.9.0 before 2.9.3.
                
            References
                    Configurations
                    No configuration.
History
                    16 Apr 2025, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-16 09:15
Updated : 2025-04-16 13:25
NVD link : CVE-2024-22036
Mitre link : CVE-2024-22036
CVE.ORG link : CVE-2024-22036
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
