Article Details

Scrape Timestamp (UTC): 2024-01-31 20:02:35.013

Source: https://thehackernews.com/2024/02/runc-flaws-enable-container-escapes.html

Original Article Text

Click to Toggle View

RunC Flaws Enable Container Escapes, Granting Attackers Host Access. Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors to escape the bounds of the container and stage follow-on attacks. The vulnerabilities, tracked as CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653, have been collectively dubbed Leaky Vessels by cybersecurity vendor Snyk. "These container escapes could allow an attacker to gain unauthorized access to the underlying host operating system from within the container and potentially permit access to sensitive data (credentials, customer info, etc.), and launch further attacks, especially when the access gained includes superuser privileges," the company said in a report shared with The Hacker News. runC is a tool for spawning and running containers on Linux. It was originally developed as part of Docker and later spun out into a separate open-source library in 2015. A brief description of each of the flaws is below - The most severe of the flaws is CVE-2024-21626, which could result in a container escape centered around the `WORKDIR` command. "This could occur by running a malicious image or by building a container image using a malicious Dockerfile or upstream image (i.e. when using `FROM`)," Snyk said. There is no evidence that any of the newly discovered shortcomings have been exploited in the wild to date. That said, the issues have been addressed in runC version 1.1.12 released today. "Because these vulnerabilities affect widely used low-level container engine components and container build tools, Snyk strongly recommends that users check for updates from any vendors providing their container runtime environments, including Docker, Kubernetes vendors, cloud container services, and open source communities," the company said. In February 2019, runC maintainers addressed another high-severity flaw (CVE-2019-5736, CVSS score: 8.6) that could be abused by an attacker to break out of the container and obtain root access on the host. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.

Daily Brief Summary

CYBERCRIME // Multiple runC Vulnerabilities Threaten Container Security

Multiple flaws have been discovered in the runC command line tool that could lead to container escapes and unauthorized host access.

The vulnerabilities, identified as CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653, allow attackers to potentially access sensitive data and escalate privileges.

runC, integral to Linux container creation and originally part of Docker, is now a critical independent open-source component.

CVE-2024-21626 is particularly severe as it involves misusing the `WORKDIR` command to achieve a container escape.

There are currently no known exploits in the wild leveraging these vulnerabilities.

Updates fixing these vulnerabilities are available in runC version 1.1.12, and immediate updating is advised.

Users are recommended to check for updates from all vendors providing container runtime environments to ensure security.

In the past, runC had addressed a similar high-severity flaw that also allowed attackers to obtain root access on the host.