Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Runc Vulnerabilities Can Be Exploited to Escape Containers

The flaws tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 have been patched.

Several vulnerabilities discovered recently in the Runc container runtime can be exploited to escape containers and gain root access to the host system.

Runc is the low-level tool designed for creating and running containers. It’s used by Kubernetes, Docker, and other platforms. 

Aleksa Sarai of SUSE Linux revealed last week that he and several other researchers discovered and reported potentially serious vulnerabilities that can lead to “full container breakouts”.

Runc updates that should patch the vulnerabilities have been released. Some affected vendors were notified ahead of public disclosure, and companies such as Red Hat and AWS have released their own advisories to inform customers of the impact of the security holes. 

The vulnerabilities are tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, and they can be exploited using malicious containers. 

“[The] attacks rely on starting containers with custom mount configurations — if you do not run untrusted container images from unknown or unverified sources then these attacks would not be possible to exploit,” Sarai noted.

Advertisement. Scroll to continue reading.

The vulnerabilities have all been assigned a CVSS score of 4.0, which puts them in the ‘medium severity’ category. However, Sarai pointed out that these scores “are based on the threat model from *runc’s point of view*” and their severity would be much higher from the perspective of “network-enabled systems like Docker or Kubernetes”.

While there is no evidence of in-the-wild exploitation, security companies such as Sysdig have added exploitation detections to their products.

Related: Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images

Related: Exposed Docker APIs Likely Exploited to Build Botnet

Related: Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.