Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
Low
Attack Vector
Adjacent_network
0

CVE-2021-21284

Disclosure Date: February 02, 2021
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the —userns-remap option in which access to remapped root allows privilege escalation to real root. When using “—userns-remap”, if the root user in the remapped namespace has access to the host filesystem they can modify files under “/var/lib/docker/<remapping>” that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.8 Medium
Impact Score:
4
Exploitability Score:
2.3
Vector:
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Attack Vector (AV):
Adjacent_network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Changed
Confidentiality (C):
None
Integrity (I):
High
Availability (A):
None

General Information

Vendors

  • debian,
  • docker,
  • netapp

Products

  • debian linux 10.0,
  • docker,
  • e-series santricity os controller
Technical Analysis