A critical security vulnerability in SUSE Manager allows unauthenticated attackers to execute arbitrary commands with root privileges. This flaw, tracked as CVE-2025-46811, has a CVSS 4.0 score of 9.3 and affects multiple versions of SUSE Manager across various platforms. The vulnerability stems from a Missing Authentication for Critical Function weakness, which targets a specific websocket endpoint. Organizations are at risk of widespread compromise, requiring immediate updates to mitigate the threat. The impact is significant as it could lead to complete system compromise, affecting enterprise infrastructure.
Source: https://cybersecuritynews.com/suse-manager-vulnerability/
TPRM report: https://scoringcyber.rankiteo.com/company/suse
"id": "sus629073125",
"linkid": "suse",
"type": "Vulnerability",
"date": "7/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Technology',
'name': 'SUSE',
'type': 'Software Vendor'}],
'attack_vector': 'Network Accessible (AV:N), Low Attack Complexity (AC:L), No '
'Required Privileges (PR:N)',
'description': 'A newly disclosed critical security vulnerability in SUSE '
'Manager poses severe risks to enterprise infrastructure, '
'allowing unauthenticated attackers to execute arbitrary '
'commands with root privileges.',
'impact': {'systems_affected': ['Container '
'suse/manager/5.0/x86_64/server:5.0.5.7.30.1',
'SLES15-SP4-Manager-Server-4-3-BYOS (all '
'variants)',
'SLES15-SP4-Manager-Server-4-3-BYOS-Azure',
'SLES15-SP4-Manager-Server-4-3-BYOS-EC2',
'SLES15-SP4-Manager-Server-4-3-BYOS-GCE',
'SUSE Manager Server Module 4.3']},
'initial_access_broker': {'entry_point': 'Websocket endpoint: '
'/rhn/websocket/minion/remote-commands'},
'post_incident_analysis': {'root_causes': 'Missing Authentication for '
'Critical Function (CWE-306)'},
'recommendations': ['Prioritize immediate patching',
'Monitor for suspicious activity'],
'response': {'containment_measures': ['Network segmentation',
'Access controls review'],
'enhanced_monitoring': True,
'network_segmentation': True,
'remediation_measures': ['Immediate patching', 'Version audits']},
'title': 'Critical Vulnerability in SUSE Manager (CVE-2025-46811)',
'type': 'Vulnerability Exploitation',
'vulnerability_exploited': 'CVE-2025-46811'}