CVE-2021-43816
containerd vulnerability analysis and mitigation

Overview

A security vulnerability (CVE-2021-43816) was discovered in containerd, affecting versions 1.5.0 through 1.5.9. The vulnerability allows an unprivileged pod to bind mount any privileged regular file on disk for complete read/write access through hostPath volume when using SELinux (GitHub Advisory).

Technical details

The vulnerability exists in containerd's CRI (Container Runtime Interface) implementation on Linux systems using the SELinux security module. Through specially-configured bind mounts in a hostPath volume, containers can cause arbitrary files and directories on the host to be relabeled to match the container process label. This relabeling effectively grants the container full read/write access over the affected files and directories (GitHub Advisory). The vulnerability has been assigned a High severity rating.

Impact

When exploited, this vulnerability allows containers to elevate their permissions, gaining full read/write access over affected files and directories on the host system. This impacts systems using containerd's CRI implementation through Kubernetes or crictl, potentially compromising the host system's security (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in containerd version 1.5.9. Users should update to this version as soon as possible and validate that all files on their host are correctly labeled. As a workaround, administrators can ensure that no sensitive files or directories are used as hostPath volume source locations and implement Kubernetes Pod Security Policy AllowedHostPaths to limit the files and directories that can be bind-mounted to containers (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related containerd vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61725HIGH7.5
  • cAdvisorcAdvisor
  • conftest-fips
NoYesOct 29, 2025
CVE-2025-61723HIGH7.5
  • cAdvisorcAdvisor
  • gostatsd
NoYesOct 29, 2025
CVE-2024-25621HIGH7.3
  • HelmHelm
  • cert-manager-cmctl-fips
NoYesNov 06, 2025
CVE-2025-64329MEDIUM6.9
  • HelmHelm
  • cert-manager-cmctl-fips
NoYesNov 07, 2025
CVE-2025-61724MEDIUM5.3
  • cAdvisorcAdvisor
  • prometheus-statsd-exporter-fips-0.22
NoYesOct 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management