Recent critical vulnerabilities discovered in runc, the container runtime used by Docker and Kubernetes, pose significant security risks by allowing attackers to escape container isolation. These flaws, identified as CVE-2023-28365 and CVE-2023-28366, enable privilege escalation and arbitrary code execution on the host system, undermining container security. The vulnerabilities stem from improper handling of user namespaces and container configuration, which attackers can exploit to break out of the container sandbox and gain unauthorized access to the underlying host. This breakthrough highlights the importance of timely patching and updating container runtimes to mitigate potential breaches. Docker, Kubernetes, and other container platforms relying on runc are urged to apply security updates immediately to protect their environments. The discovery underscores the evolving threat landscape targeting container technologies and the need for robust security practices in DevOps workflows. Organizations should implement strict access controls, continuous monitoring, and vulnerability management to defend against such sophisticated attacks. This incident serves as a critical reminder of the risks associated with containerized applications and the necessity of proactive cybersecurity measures to safeguard infrastructure.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Sun, 09 Nov 2025 15:55:13 +0000