Advisory

Critical flaw in SUSE Manager exposes enterprise deployments to compromise

Take action: This one is URGENT: If you have SUSE Manager systems, immediately block network access to port 443 or isolate these systems from untrusted networks. Attackers can execute commands with root privileges without any authentication. Then plan an urgent update of the systems.


Learn More

A critical security vulnerability is reported in SUSE Manager that enables unauthorized attackers to execute arbitrary commands with root privileges on affected systems. 

The vulnerability is tracked as CVE-2025-46811 (CVSS score 9.8), and is a Missing Authentication for Critical Function weakness in SUSE Manager's websocket communication infrastructure. The vulnerability affects the /rhn/websocket/minion/remote-commands endpoint, which was designed to facilitate real-time communication between SUSE Manager servers and their managed client system. This endpoint lacks proper authentication verification mechanisms, creating a vector for unauthorized administrative access.

During an internal security audit conducted by a customer organization, security researchers discovered that the websocket endpoint completely bypasses authentication requirements when processing remote command requests. This allows any individual with network connectivity to port 443 of a SUSE Manager instance to execute Salt commands across the entire managed infrastructure without providing credentials.

The vulnerability impacts multiple SUSE Manager deployments:

  • Container deployments using suse/manager/5.0/x86_64/server:5.0.5.7.30.1
  • SUSE Linux Enterprise Server 15 SP4 Manager Server images deployed on major cloud platforms, including Amazon EC2, Microsoft Azure, and Google Cloud Engine BYOS (Bring Your Own Subscription) implementations.
  • SUSE Manager Server Module 4.3 installations
  • Testing conducted on the latest SUSE Manager version 5.0.4.1 confirmed that the vulnerability affects current releases

Security researchers have created a proof-of-concept HTML webpage that connects to the vulnerable websocket endpoint and executes commands without authentication. The demonstration, conducted using an incognito browser session to eliminate any possibility of session cookie authentication, confirmed that arbitrary Salt commands can be executed across managed systems with root privileges.

Organizations operating affected SUSE Manager versions must treat this vulnerability as a critical security emergency. The first priority should be identifying all SUSE Manager instances within the organization and blocking network exposure to the vulnerable endpoint.

SUSE has released security updates  and organizations should prioritize patching on all systems. Until patches are fully deployed and verified, organizations should implement network-level access controls to restrict connectivity to the vulnerable websocket endpoint.

Critical flaw in SUSE Manager exposes enterprise deployments to compromise