Wiz Agents & Workflows are here

CVE-2020-15157
Docker vulnerability analysis and mitigation

Overview

CVE-2020-15157 is a credential leaking vulnerability discovered in containerd (an industry-standard container runtime) versions before 1.2.14. The vulnerability was disclosed in October 2020 and affects the container image-pulling process. The issue impacts systems using containerd's default resolver, including the cri-containerd plugin used by Kubernetes, the ctr development tool, and other client programs that explicitly link against it (Aqua Security, GitHub Advisory).

Technical details

The vulnerability occurs when processing URLs in container image manifests using the OCI Image format or Docker Image V2 Schema 2 format. If a container image manifest includes a URL for a specific image layer (known as a 'foreign layer'), the default containerd resolver will attempt to download it. In v1.2.x versions, the resolver provides authentication credentials if the server hosting the URL responds with an HTTP 401 status code along with registry-specific HTTP headers. The vulnerability has been rated as medium severity with a CVSS v3.1 score of 6.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N) (GitHub Advisory).

Impact

If exploited, an attacker could obtain the credentials used for pulling images. These credentials could be either the user's username and password for the registry or the credentials attached to the cloud virtual instance, potentially granting access to other cloud resources in the account (GitHub Advisory, Aqua Security).

Mitigation and workarounds

The vulnerability has been fixed in containerd version 1.2.14. Users of containerd 1.3 and later versions are not affected. For those using cri-containerd in the 1.2 series or prior, it is recommended to only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected (GitHub Advisory, Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Related Docker vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68121CRITICAL10
  • cAdvisorcAdvisor
  • localstack
NoYesFeb 05, 2026
CVE-2026-33747CRITICAL9.8
  • DockerDocker
  • podman-tests
NoYesMar 27, 2026
CVE-2026-34040HIGH8.8
  • cAdvisorcAdvisor
  • wolfictl
NoYesMar 31, 2026
CVE-2026-33748HIGH8.2
  • DockerDocker
  • trivy
NoYesMar 27, 2026
CVE-2026-33997MEDIUM6.8
  • cAdvisorcAdvisor
  • wolfictl
NoYesMar 31, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management