Overly Broad Default Permission Vulnerability in containerd by Docker
CVE-2024-25621

7.3HIGH

Key Information:

Vendor

Containerd

Vendor
CVE Published:
6 November 2025

What is CVE-2024-25621?

The containerd open-source container runtime has a default permission vulnerability that incorrectly grants broad access to critical directory paths, including /var/lib/containerd, /run/containerd/io.containerd.grpc.v1.cri, and /run/containerd/io.containerd.sandbox.controller.v1.shim. This misconfiguration can expose sensitive components to unauthorized access, potentially leading to security breaches. Users are advised to upgrade to versions 1.7.29, 2.0.7, 2.1.5, or 2.2.0 to mitigate this risk. Temporary workarounds include adjusting system administrator permissions or utilizing rootless mode for enhanced security.

Affected Version(s)

containerd < 1.7.29 < 1.7.29

containerd >= 2.0.0-beta.0, < 2.0.7 < 2.0.0-beta.0, 2.0.7

containerd >= 2.1.0-beta.0, < 2.1.5 < 2.1.0-beta.0, 2.1.5

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.