Improper Access Control in Marathon UI of DC/OS by Mesosphere
CVE-2017-20198

9.3CRITICAL

Key Information:

Vendor

D2iq, Inc.

Vendor
CVE Published:
23 July 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2017-20198?

The Marathon UI in DC/OS versions prior to 1.9.0 is susceptible to a vulnerability that allows unauthenticated users to deploy arbitrary Docker containers. This issue stems from improper restrictions on volume mount configurations, enabling attackers to mount the host's root filesystem with read/write privileges. An exploit could involve deploying a malicious Docker image, potentially allowing the attacker to execute arbitrary code with root privileges by manipulating critical system files like /etc/cron.d/. This vulnerability poses a risk to any system that permits the Docker daemon to engage with Marathon container configurations without appropriate policy enforcement.

Affected Version(s)

DC/OS Marathon * < 1.9.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erik Daguerre
.
CVE-2017-20198 : Improper Access Control in Marathon UI of DC/OS by Mesosphere