runc Vulnerability Allows Container Escape and Host File Access

CVE-2024-21626
8.6HIGH

Key Information

Vendor
Opencontainers
Status
Runc
Vendor
CVE Published:
31 January 2024

Badges

🔥 No. 1 Trending😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

CVE-2024-21626 is a vulnerability in all versions of runc <=1.1.11, used by Docker engine and other containerization technologies, allowing for container escape and access to the host OS. Exploiting this issue can result in unauthorized access to the underlying host's file system, with potential for further system compromise. The vulnerability has been addressed in runc 1.1.12, and organizations are advised to update their container infrastructure to mitigate the risk. The Snyk team has created runtime and static detection tools to help assess the vulnerability in container environments. Organizations should consider immediate action to update runc and associated technologies to prevent exploitation of this vulnerability.

Affected Version(s)

runc = >=v1.0.0-rc93, < 1.1.12

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • 👾

    Exploit exists.

  • 🔥

    Vulnerability reached the number 1 worldwide trending spot.

  • Vulnerability started trending.

  • First article discovered by Snyk

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseOpencontainers Feed4 Proof of Concept(s)11 News Article(s)
.