Feb 28, 2026·6 min read·21 visits
The Harvester ISO installer exposes SSH with default credentials during the network configuration step, before the password reset prompt. Attackers can hijack the node during installation. Fixed in v1.7.0.
A critical vulnerability exists in the SUSE Virtualization (Harvester) interactive installer versions 1.5.x and 1.6.x. The installer sequence enables network interfaces and the SSH service before requiring the administrator to change the default 'rancher' user password. This creates a race condition or 'window of opportunity' where an unauthenticated attacker on the network can log in using known default credentials and gain root access to the node before the installation completes.
SUSE Harvester is a modern hyperconverged infrastructure (HCI) solution built on Kubernetes and Longhorn. When deploying Harvester via the interactive ISO installer, the system guides the administrator through a series of configuration steps (network setup, disk selection, cluster tokens, and password configuration). Ideally, a system should remain secure at every stage of this bootstrapping process.
CVE-2025-62877 represents a logical flaw in the ordering of these installation steps. In affected versions (1.5.x and 1.6.x), the installer activates the network stack to facilitate cluster discovery or remote resource fetching. Crucially, this activation starts the sshd service. At this specific point in the installation wizard, the underlying operating system user—rancher—is still configured with a vendor-supplied default password. This results in the exposure of a fully privileged account over the network before the administrator has been given the opportunity to secure it.
The vulnerability is classified as CWE-1188: Initialization of a Resource with an Insecure Default. The root cause lies in the sequential dependency graph of the installer's finite state machine. The installer requires network connectivity to validate VIPs (Virtual IPs) or join existing clusters. Consequently, it brings up the network interface and starts the OpenSSH Server daemon early in the process.
However, the step that creates the definitive system configuration—specifically the cloud-config or user data that overwrites the default rancher password—is applied later in the sequence. Between the moment the network interface acquires an IP address (via DHCP or static assignment) and the moment the user completes the 'Configure Password' step, the system is exposed.
Because the rancher user typically possesses passwordless sudo privileges to facilitate system management, valid SSH authentication immediately translates to full root compromise. The vulnerability is deterministic: if the network is active and the password has not yet been changed, the system is vulnerable.
The remediation for CVE-2025-62877 involved re-architecting the installer's workflow to enforce a 'Secure-First' approach. Below is a logical comparison of the installation flow before and after the fix in version 1.7.0.
In the vulnerable flow, the attack surface (Network/SSH) opens while the credential state is still 'Default'.
> [!WARNING] VULNERABILITY WINDOW OPENSrancher with default password.> [!WARNING] VULNERABILITY WINDOW CLOSESIn the fixed version, the dependency chain is inverted. The credential reset is a prerequisite for network activation.
> [!NOTE] SSH is now exposed, but the rancher user is already secured with the custom password.Exploitation of this vulnerability is trivial and requires no specialized exploit code, only standard network tools. An attacker positioned on the same network segment (or a routable network segment) as the bare-metal server being provisioned can automate the attack.
Attack Scenario:
rancher, Password: rancher or similar vendor default).sudo -i to gain root privileges. They can then plant a persistent backdoor (e.g., adding an authorized key to /root/.ssh/authorized_keys, creating a new user, or modifying the installation scripts) that will survive the installation process and persist into the final production environment.This attack vector is particularly dangerous in automated or semi-automated deployment environments where administrators may not be actively monitoring the console of every node being provisioned.
The impact of CVE-2025-62877 is critical, reflected in its CVSS 9.8 score. The vulnerability allows for complete system compromise at the infrastructure level.
Since Harvester nodes are hypervisors hosting virtual machines and container workloads, compromising the host node provides a pathway to compromise all workloads running on that node.
The primary remediation is to upgrade the installation media.
Users must download and use Harvester ISO v1.7.0 or later for all new installations. This version enforces the password reset prior to network initialization.
If utilizing v1.5.x or v1.6.x media is unavoidable, strict network isolation is required:
config-yaml file at boot time, bypassing the interactive wizard's vulnerable sequence.CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Harvester SUSE | >= 1.5.0, < 1.7.0 | 1.7.0 |
| Attribute | Detail |
|---|---|
| CWE | CWE-1188 (Insecure Default Initialization) |
| CVSS v3.1 | 9.8 (Critical) |
| Attack Vector | Network (AV:N) |
| Privileges Required | None (PR:N) |
| EPSS Score | 0.02% |
| Fix Version | v1.7.0 |
The product initializes a resource with a default that is not secure, such as a default password or permissive access control list.