Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Runc Vulnerabilities Can Be Exploited to Escape Containers

Posted on November 10, 2025November 10, 2025 By CWS

A number of vulnerabilities found just lately within the Runc container runtime will be exploited to flee containers and acquire root entry to the host system.

Runc is the low-level software designed for creating and operating containers. It’s utilized by Kubernetes, Docker, and different platforms. 

Aleksa Sarai of SUSE Linux revealed final week that he and several other different researchers found and reported probably critical vulnerabilities that may result in “full container breakouts”.

Runc updates that ought to patch the vulnerabilities have been launched. Some affected distributors have been notified forward of public disclosure, and firms comparable to Pink Hat and AWS have launched their very own advisories to tell prospects of the impression of the safety holes. 

The vulnerabilities are tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, and they are often exploited utilizing malicious containers. 

“[The] assaults depend on beginning containers with customized mount configurations — if you don’t run untrusted container photos from unknown or unverified sources then these assaults wouldn’t be potential to take advantage of,” Sarai famous.

The vulnerabilities have all been assigned a CVSS rating of 4.0, which places them within the ‘medium severity’ class. Nonetheless, Sarai identified that these scores “are primarily based on the risk mannequin from *runc’s perspective*” and their severity could be a lot larger from the angle of “network-enabled techniques like Docker or Kubernetes”.

Whereas there isn’t a proof of in-the-wild exploitation, safety corporations comparable to Sysdig have added exploitation detections to their merchandise.Commercial. Scroll to proceed studying.

Associated: Echo Raises $15M in Seed Funding for Vulnerability-Free Container Pictures

Associated: Uncovered Docker APIs Possible Exploited to Construct Botnet

Associated: Pattern Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Uncovered

Security Week News Tags:Containers, Escape, Exploited, runc, Vulnerabilities

Post navigation

Previous Post: Two New Web Application Risk Categories Added to OWASP Top 10
Next Post: Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America

Related Posts

Hackers Stole Data From Public Safety Comms Firm BK Technologies Security Week News
High-Severity Flaws Patched in Chrome, Firefox Security Week News
Malicious Code on Unity Website Skims Information From Hundreds of Customers Security Week News
Kosovar Administrator of Cybercrime Marketplace Extradited to US Security Week News
SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility Security Week News
Gladinet Patches Exploited CentreStack Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News