CVE-2021-25749
runAsNonRoot logic bypass for Windows containers
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
< 1%
*EPSS
Affected Versions
4
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Windows workloads can run as ContainerAdministrator even when those workloads set the runAsNonRoot option to true.
A flaw was found in Kubernetes. This issue allows Windows workloads to run as a ContainerAdministrator even when the workloads set the runAsNonRoot option to true.
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers. Issues addressed include bypass and denial of service vulnerabilities.
*Credits:
Mark Rosetti (@marosset) of Microsoft
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2021-01-21 CVE Reserved
- 2023-01-30 CVE Published
- 2025-01-16 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
- CWE-842: Placement of User into Incorrect Group
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|