Docker Security Advisory: AuthZ Plugin Bypass Regression in Docker Engine (CVE-2024-41110)
25247
12 December 2024
12 December 2024
CLOSED
LOW
9.9 CRITICAL Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE-2024-41110
Brocade Security Advisory ID |
BSA-2024-2670 |
Component |
Docker_Engine |
|
|
Summary
Brocade Security Team has become aware that Certain versions of Docker Engine have a security vulnerability that could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.
Detail
Docker’s default authorization model is all-or-nothing. Users with access to the Docker daemon can execute any Docker command. For greater access control, authorization plugins (AuthZ) can be used. These plugins approve or deny requests to the Docker daemon based on authentication and command context.
In 2018, a security issue was discovered where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. The issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later versions, resulting in a regression.
More detail about the issue, the affected versions and remediations steps for impacred users is available at: https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin/
Products Confirmed Not Affected
-
Brocade SANnav [VEX Justification: Vulnerable_code_not_in_execute_path]
-
Brocade ASCG [VEX Justification: Component_not_present]
-
Brocade Fabric OS [VEX Justification: Component_not_present]
Note on Brocade SANnav
Although Brocade SANnav is Not Exploitable, a security update is provided in Brocade SANnav 2.4.0 and 2.3.1b
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
December 12, 2024 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.