Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Runc Vulnerabilities Can Be Exploited to Escape Containers

Posted on November 10, 2025November 10, 2025 By CWS

A number of vulnerabilities found just lately within the Runc container runtime will be exploited to flee containers and acquire root entry to the host system.

Runc is the low-level software designed for creating and operating containers. It’s utilized by Kubernetes, Docker, and different platforms. 

Aleksa Sarai of SUSE Linux revealed final week that he and several other different researchers found and reported probably critical vulnerabilities that may result in “full container breakouts”.

Runc updates that ought to patch the vulnerabilities have been launched. Some affected distributors have been notified forward of public disclosure, and firms comparable to Pink Hat and AWS have launched their very own advisories to tell prospects of the impression of the safety holes. 

The vulnerabilities are tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, and they are often exploited utilizing malicious containers. 

“[The] assaults depend on beginning containers with customized mount configurations — if you don’t run untrusted container photos from unknown or unverified sources then these assaults wouldn’t be potential to take advantage of,” Sarai famous.

The vulnerabilities have all been assigned a CVSS rating of 4.0, which places them within the ‘medium severity’ class. Nonetheless, Sarai identified that these scores “are primarily based on the risk mannequin from *runc’s perspective*” and their severity could be a lot larger from the angle of “network-enabled techniques like Docker or Kubernetes”.

Whereas there isn’t a proof of in-the-wild exploitation, safety corporations comparable to Sysdig have added exploitation detections to their merchandise.Commercial. Scroll to proceed studying.

Associated: Echo Raises $15M in Seed Funding for Vulnerability-Free Container Pictures

Associated: Uncovered Docker APIs Possible Exploited to Construct Botnet

Associated: Pattern Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Uncovered

Security Week News Tags:Containers, Escape, Exploited, runc, Vulnerabilities

Post navigation

Previous Post: Two New Web Application Risk Categories Added to OWASP Top 10
Next Post: OWASP Top 10 2025 – Revised Version Released With Two New Categories

Related Posts

Swimlane Raises $45 Million for Security Automation Platform Security Week News
Hackers Extorting Salesforce After Stealing Data From Dozens of Customers Security Week News
Canadian Electric Utility Says Power Meters Disrupted by Cyberattack Security Week News
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Security Week News
Air France, KLM Say Hackers Accessed Customer Data Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories
  • Runc Vulnerabilities Can Be Exploited to Escape Containers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
  • Many Forbes AI 50 Companies Leak Secrets on GitHub
  • Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
  • OWASP Top 10 2025 – Revised Version Released With Two New Categories
  • Runc Vulnerabilities Can Be Exploited to Escape Containers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News