Overly Broad Default Permission Vulnerability in containerd by Docker
CVE-2024-25621

7.3HIGH

Key Information:

Vendor

Containerd

Vendor
CVE Published:
6 November 2025

What is CVE-2024-25621?

The containerd open-source container runtime has a default permission vulnerability that incorrectly grants broad access to critical directory paths, including /var/lib/containerd, /run/containerd/io.containerd.grpc.v1.cri, and /run/containerd/io.containerd.sandbox.controller.v1.shim. This misconfiguration can expose sensitive components to unauthorized access, potentially leading to security breaches. Users are advised to upgrade to versions 1.7.29, 2.0.7, 2.1.5, or 2.2.0 to mitigate this risk. Temporary workarounds include adjusting system administrator permissions or utilizing rootless mode for enhanced security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

containerd < 1.7.29 < 1.7.29

containerd >= 2.0.0-beta.0, < 2.0.7 < 2.0.0-beta.0, 2.0.7

containerd >= 2.1.0-beta.0, < 2.1.5 < 2.1.0-beta.0, 2.1.5

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.