Логотип exploitDog
bind: "CVE-2025-54388"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-54388"

Количество 9

Количество 9

ubuntu логотип

CVE-2025-54388

3 месяца назад

Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.

CVSS3: 4.6
EPSS: Низкий
redhat логотип

CVE-2025-54388

3 месяца назад

Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.

CVSS3: 5.2
EPSS: Низкий
nvd логотип

CVE-2025-54388

3 месяца назад

Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.

CVSS3: 4.6
EPSS: Низкий
debian логотип

CVE-2025-54388

3 месяца назад

Moby is an open source container framework developed by Docker Inc. th ...

CVSS3: 4.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02914-1

около 2 месяцев назад

Security update for docker

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02913-1

около 2 месяцев назад

Security update for docker

EPSS: Низкий
github логотип

GHSA-x4rx-4gw3-53p4

3 месяца назад

Moby firewalld reload makes published container ports accessible from remote hosts

CVSS3: 4.6
EPSS: Низкий
fstec логотип

BDU:2025-09391

3 месяца назад

Уязвимость демона firewalld программного средства для создания систем контейнерной изоляции Moby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.2
EPSS: Низкий
redos логотип

ROS-20250908-12

около 1 месяца назад

Множественные уязвимости portainer-ce

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-54388

Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.

CVSS3: 4.6
0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-54388

Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.

CVSS3: 5.2
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-54388

Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.

CVSS3: 4.6
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-54388

Moby is an open source container framework developed by Docker Inc. th ...

CVSS3: 4.6
0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02914-1

Security update for docker

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02913-1

Security update for docker

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-x4rx-4gw3-53p4

Moby firewalld reload makes published container ports accessible from remote hosts

CVSS3: 4.6
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-09391

Уязвимость демона firewalld программного средства для создания систем контейнерной изоляции Moby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.2
0%
Низкий
3 месяца назад
redos логотип
ROS-20250908-12

Множественные уязвимости portainer-ce

CVSS3: 6.5
около 1 месяца назад

Уязвимостей на страницу