Lucene search

K
redosRedosROS-20230824-01
HistoryAug 24, 2023 - 12:00 a.m.

ROS-20230824-01

2023-08-2400:00:00
redos.red-soft.ru
8

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:P/A:P

0.004 Low

EPSS

Percentile

73.1%

The Swarm Mode vulnerability of the dockerd daemon of the containerization software tool Moby and the Mirantis Container Runtime runtime is related to the use of the Swarm Mode of the dockerd daemon.
Moby container isolation system and Mirantis Container Runtime is related to the use of an insecure alternate channel.
an insecure alternate channel. Exploitation of the vulnerability could allow an attacker acting remotely to affect the integrity of the container.
remotely, to impact the integrity and availability of protected information by sending
unencrypted packets

The Moby container platform vulnerability is related to the lack of encrypted sensitive data in the overlay network driver.
overlay network driver. Exploitation of the vulnerability could allow an attacker acting remotely
to obtain sensitive information by sending a crafted request and use that information to launch further attacks on the overlay network driver.
information to launch further attacks against the vulnerable system.

Swarm Mode vulnerability in the dockerd daemon of the containerization software tool Moby and the Moby container execution environment.
Moby Container Isolation System and Mirantis Container Runtime is related to the use of an insecure alternate channel.
an insecure alternate channel. Exploitation of the vulnerability could allow an attacker acting remotely to affect the integrity of the container isolation system.
remotely to affect the integrity of protected information by sending unencrypted
packets

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64docker-ce<=ย 20.10.24-1UNKNOWN

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:P/A:P

0.004 Low

EPSS

Percentile

73.1%