HomeDockerCVE-2021-21284

CVE-2021-21284

MEDIUM
6.8CVSS
Published: 2021-02-02
Updated: 2024-11-21
AI Analysis

Description

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.

CVSS Metrics

Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Attack Vector
adjacent network
Complexity
low
Privileges
low
User Action
none
Scope
changed
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-22CWE-22

Metadata

Primary Vendor
DOCKER
Published
2/2/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

docker : dockerdocker : dockerdebian : debian_linuxnetapp : e-series_santricity_os_controller

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-21284 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com