CVE-2024-21626Exploit Available

runc Container Escape via Process Working Directory

🏭 Open Container InitiativeCWE-22#Container Escape#Docker#Kubernetes#Privilege Escalation
8.6High
010.0

Vulnerability Description

A critical vulnerability in runc (the container runtime) allows an attacker with the ability to spawn processes inside a container to escape the container namespace by manipulating the Process.cwd field. This can result in full host compromise.

Recommended Mitigation

Update runc to 1.1.12+. Update Docker Desktop to 4.27.1+. Audit container workloads for suspicious process creation patterns.

Affected Products

runc
Docker
containerd
Kubernetes

Version constraint: runc < 1.1.12, Docker < 25.0.2

Quick Facts

Published
2024-01-31
Last Modified
2024-02-05
Vendor
Open Container Initiative
CWE
CWE-22
Exploit
⚠️ Public Exploit Exists

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H