ServiceAccount Impersonation Flaw in Fleet by SUSE
CVE-2026-41050

9.9CRITICAL

Key Information:

Vendor

Suse

Status
Vendor
CVE Published:
13 May 2026

What is CVE-2026-41050?

CVE-2026-41050 is a vulnerability identified within the Fleet application by SUSE, which is designed to manage deployments and configurations in Kubernetes environments. This specific flaw pertains to a ServiceAccount impersonation issue in the Helm deployer component of Fleet. The vulnerability exists because the system does not appropriately enforce ServiceAccount impersonation in certain code paths. As a result, a tenant with git push access to a monitored repository can exploit this weakness to gain unauthorized access to sensitive secrets stored in any namespace across all downstream clusters that their GitRepo targets. This breach of confidentiality can severely compromise the security of an organization’s Kubernetes environment, leading to unauthorized data access and potential data leakage.

Potential impact of CVE-2026-41050

  1. Unauthorized Access to Secrets: Attackers could leverage this vulnerability to read sensitive information, such as credentials and API keys, from any namespace in the affected Kubernetes clusters, thereby facilitating further attacks on infrastructure.

  2. Widespread Data Exposure: Given that the flaw allows access across multiple downstream clusters, the risk of extensive data exposure increases significantly. This can lead to operational disruptions and necessitate costly incident response efforts.

  3. Escalation of Attacks: Gaining access to service accounts and secrets can provide attackers with the means to escalate their permissions and conduct further malicious activities, such as deploying malware, exfiltrating additional data, or disrupting services across the entire Kubernetes environment.

Affected Version(s)

Rancher 0.15.0 < 0.15.1

Rancher 0.14.0 < 0.14.5

Rancher 0.13.0 < 0.13.10

References

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

https://github.com/kodareef5
.