Tracked as CVE-2026-34040, this security flaw stems from an incomplete patch for a previously known vulnerability, leaving specific Docker configurations exposed to exploitation.
In enterprise environments, administrators frequently use Docker authorization plugins (AuthZ) to control access to the Docker API.
These plugins act as gatekeepers, inspecting the body of incoming API requests to determine if a user has permission to perform specific actions.
Security researchers discovered that an attacker can bypass these checks using a specially crafted API request with an oversized body.
When this oversized request is processed, the Docker daemon forwards the request to the AuthZ plugin but drops the body entirely.
Without the body to inspect, the authorization plugin fails to detect the malicious payload. It approves a request it should have denied.
This vulnerability is recognized as an incomplete fix for CVE-2024-41110, an older flaw that exhibited similar authorization bypass behavior.
This vulnerability is classified as “High” severity with a CVSS v3.1 profile indicating that an attacker needs only local access and low privileges to execute the exploit.
Low complexity, no user interaction, exploitation can escape containers and compromise the host system. Fortunately, the base likelihood of this exploit occurring in the wild remains low.
The impact is strictly limited to environments that depend on authorization plugins to introspect request bodies for access control decisions.
If your infrastructure does not use AuthZ plugins, your Docker instances are completely unaffected by this vulnerability. The Docker development team has resolved this vulnerability with the release of Docker Engine version 29.3.1, as noted on GitHub.
System administrators and security teams are strongly encouraged to upgrade to this patched version immediately to secure their infrastructure.
For organizations that cannot deploy the update right away, there are effective workarounds available to mitigate the risk:
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Docker Vulnerability Let Attackers Bypass Authorization and Gain Host Access appeared first on Cyber Security News.
Steven Spielberg has discussed his time working on Interstellar, which he ended up walking away…
BIG COUNTRY, Texas (KTAB/KRBC) - The Storm Prediction Center (SPC) has issued the Day 3 outlook for…
BIG COUNTRY, Texas (KTAB/KRBC) - In this episode of Carter and Kat’s Weather Chat, Carter…
POTOSI, Texas (KTAB/KRBC) - You might expect to see a lemur at the zoo, but…
ABILENE, Texas (KTAB/KRBC) - Community members raised concerns about a zoning change request at Tuesday's…
Pragmata is shaping up to be one of the biggest releases of this month, and…
This website uses cookies.