! 2 0 1 6 5 1 7,, a platform broke Docker Swarm cluster port opening is exposed to the outside,resulting in remote unauthorized access vulnerability,then the executable Docker node specific command. To exploit the vulnerability directly obtain root privileges. What is Docker? Docker is an Open-Source Engine,you can easily for any application to create a lightweight, portable, self-sufficient container. Developers in a notebook compiled test through the container can in bulk to deployment in a production environment,including VMs(virtual machines), the bare metal, OpenStack clusters and the other based application platform. Vulnerability statistics The first time,webscan its vulnerability tracking,through to global 1 9 5 million open 2 3 7 5 port is detected. Finally, to confirm the presence of vulnerabilities the host number is not 1 3 3 9,wherein the region of China 1 9 1,Taiwan, Province of China 1 to 0. A total of 2 0 1 of the servers is the problem. Wherein the distribution is as follows: ! (Figure a global presence docker unauthorized access vulnerability top 1 0) ! (Figure II region of China there is docker is not authorized to access the vulnerability of each of the provincial distribution) ! (Figure three Chinese regions there is docker is not authorized to access the vulnerability of the city distribution) Bug fixes The 1, 2 3 7 5 port prohibiting open to the public. 2, The use of encryption Protocol for transmission,to prevent MITM attacks 3, change the network access control,according to the Swarm official document reasonable configuration of access rules Here's hoping everyone fixed as soon as possible loopholes. To reduce the losses. So as not to be a malicious attacker using!