Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Critical Docker Vulnerability Could Grant Hackers Full Access
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Critical Docker Vulnerability Could Grant Hackers Full Access
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Vulnerabilities » Critical Docker Vulnerability Could Grant Hackers Full Access

Vulnerabilities

Critical Docker Vulnerability Could Grant Hackers Full Access

A critical security flaw in Docker Engine, identified as CVE-2024-41110, allows attackers to bypass authorization plugins and potentially gain unauthorized access.

Marco Rizal
Last updated: August 21, 2024 9:54 am
By Marco Rizal - Editor, Journalist 4 Min Read
Share
Critical Docker Vulnerability Could Grant Hackers Full Access
SHARE

A security vulnerability has been found in specific versions of Docker Engine, which could potentially enable attackers to bypass authorization plugins and gain unauthorized access without proper authorization.

This vulnerability, known as CVE-2024-41110, is considered critical and has a CVSS score of 10, indicating that Docker users should address this issue promptly.

Docker is widely used for containerization, allowing developers to conveniently bundle applications with all the required components.

The Docker Engine, at its core, utilizes an authorization model that is all-or-nothing by default. Users who have access to the Docker daemon have the ability to execute any Docker command.

Adding authorization plugins (AuthZ) allows for greater control over requests, as they can be approved or denied based on specific criteria.

Unfortunately, a vulnerability has been discovered in Docker Engine that enables attackers to circumvent these plugins in specific situations.

More details on the vulnerability

The vulnerability was first identified in 2018. It involves sending a specially crafted API request to the Docker daemon with the Content-Length set to 0.

This request causes the Docker daemon to forward the request without the body to the AuthZ plugin, which might incorrectly approve it, leading to unauthorized actions and privilege escalation.

The issue was resolved in Docker Engine v18.09.1, which was released in January 2019. Unfortunately, this fix did not persist in subsequent versions, leading to a regression.

The vulnerability resurfaced in versions starting from v19.03 and was identified once more in April 2024. On July 23, 2024, patches were released to resolve the issue in the affected versions.

The affected versions include:

  • v19.03.15
  • v20.10.27
  • v23.0.14
  • v24.0.9
  • v25.0.5
  • v26.0.2
  • v26.1.4
  • v27.0.3
  • v27.1.0

This vulnerability affects users of Docker Engine versions 19.03.x and newer who depend on authorization plugins for access control.

If you do not use AuthZ plugins, or if you use all versions of Mirantis Container Runtime, you are not affected.

Users of Docker’s commercial products and internal infrastructure that do not use AuthZ plugins are also safe.

Docker Desktop, a popular development tool, is also affected up to version 4.32.0, as it includes vulnerable versions of Docker Engine.

On the other hand, the risk is reduced as exploiting this vulnerability necessitates access to the Docker API.

Typically, an attacker would require physical access to the host machine, unless the Docker daemon is exposed in an insecure manner over TCP.

The default configuration of Docker Desktop does not come with AuthZ plugins, and any privilege escalation is confined to the Docker Desktop VM rather than the underlying host.

What you should do

In the upcoming Docker Desktop version 4.33, there will be an updated version of Docker Engine that has been patched.

If you are using an affected version of Docker Engine update to the latest patched version (v23.0.14, v27.1.0 and later).

If you are unable to update immediately, you should avoid using AuthZ plugins to ensure that the Docker API is not exposed over TCP without proper protection.

You should also restrict access to the Docker API to trusted parties only, following the principle of least privilege.

More Stories

Digital Wallet Loophole Allows Criminals to Shop for Free with Locked Cards

Casio Suspends Repair Services After Major Cyberattack Disrupts Systems

Say Goodbye to Spam Alerts with Chrome’s Latest Update

Are Chinese-Made IP Cameras Risking Your Privacy?

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Zero Day Vulnerability in Google Chrome

Zero-Day Vulnerability in Google Chrome Allegedly for Sale on Dark Web

Critical Flaw Found in Two Factor Authenticator Yubikey Will Likely Not Be Patched

Critical Flaw Found in Two-Factor Authenticator YubiKey Will Likely Not Be Patched

Why Hackers Are Loving Electric Car Charging Stations

Why Hackers Are Loving Electric Car Charging Stations

U.S. Government Cracks Down On Commercial Spyware Vendors

U.S. Government Cracks Down On Commercial Spyware Vendors

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?