Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

‘Leaky Vessels’ Container Escape Vulnerabilities Impact Docker, Others 

Snyk discloses information on Leaky Vessels, several potentially serious container escape vulnerabilities affecting Docker and others.

Leaky Vessels container vulnerabilities

Researchers at developer security company Snyk have discovered several potentially serious vulnerabilities that could be exploited by malicious actors to escape containers.

The flaws are collectively called Leaky Vessels and they are tracked as CVE-2024-21626, CVE-2024-23651, CVE-2024-23653 and CVE-2024-23652.

The security holes were discovered late last year in Docker’s Runc, a tool designed for spawning and running containers on Linux, and BuildKit, a system for building images, both of which are open source. 

While Snyk has found no evidence of exploitation in the wild, the company warned that an attacker could leverage the Leaky Vessels flaws to escape a container and gain access to the underlying host operating system. From there, they could access data stored on the system, which can include customer information and credentials, and conduct further attacks. 

“These vulnerabilities can only be exploited if a user actively engages with malicious content by incorporating it into the build process or running a container from a suspect image (particularly relevant for the CVE-2024-21626 container escape vulnerability),” Docker explained

“Potential impacts include unauthorized access to the host filesystem, compromising the integrity of the build cache, and, in the case of CVE-2024-21626, a scenario that could lead to full container escape,” it added. 

Advertisement. Scroll to continue reading.

Patches and mitigations are available for the Runc and BuildKit vulnerabilities. Users have been advised to install available patches and keep an eye out for updates from Kubernetes vendors, cloud container services, and open source communities that use the vulnerable components. 

“You should upgrade systems running container engines and container build tools as soon as fixes are released by your providers,” Snyk urged users. 

Security advisories for the Leaky Vessels vulnerabilities have been released by the time of writing by Google Cloud, AWS, and Ubuntu

Related: MySQL Servers, Docker Hosts Infected With DDoS Malware

Related: GNU C Library Vulnerability Leads to Full Root Access

Related: Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.