A vulnerability has been identified within Rancher Manager in which it 
did not enforce request body size limits on certain public 
(unauthenticated) and authenticated API endpoints. This allows a 
malicious user to exploit this by sending excessively large payloads, 
which are fully loaded into memory during processing, leading to Denial of Service (DoS).
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 03 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Suse
         Suse rancher  | 
|
| Vendors & Products | 
        
        Suse
         Suse rancher  | 
Tue, 02 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 02 Sep 2025 12:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability has been identified within Rancher Manager in which it did not enforce request body size limits on certain public (unauthenticated) and authenticated API endpoints. This allows a malicious user to exploit this by sending excessively large payloads, which are fully loaded into memory during processing, leading to Denial of Service (DoS). | |
| Title | Rancher affected by unauthenticated Denial of Service | |
| Weaknesses | CWE-770 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: suse
Published: 2025-09-02T11:53:03.928Z
Updated: 2025-09-02T13:28:15.865Z
Reserved: 2025-07-23T08:10:38.954Z
Link: CVE-2024-58259
Updated: 2025-09-02T13:28:12.214Z
Status : Awaiting Analysis
Published: 2025-09-02T12:15:35.650
Modified: 2025-09-02T15:55:25.420
Link: CVE-2024-58259
No data.
ReportizFlow