CVE-2022-23648
Docker vulnerability analysis and mitigation

Overview

CVE-2022-23648 is a security vulnerability discovered in containerd, affecting versions prior to 1.6.1, 1.5.10, and 1.4.13. The vulnerability was reported by Felix Wilhelm of Google's Project Zero on November 22, 2021, and patched on March 2, 2022. The issue affects containerd's CRI (Container Runtime Interface) implementation, which is commonly used in Kubernetes environments (Crowdstrike Blog, GitHub Advisory).

Technical details

The vulnerability resides in containerd's CRI plugin that handles OCI image specifications containing 'Volumes'. The issue stems from the plugin's failure to validate paths in the Config.Volumes field before using them in runtime field mounts. An attacker can exploit this by adding a Volume containing path traversal to the image and use it to copy arbitrary files from the host to container mounted paths. The vulnerability exists in the copyExistingContents function, where attacker-controlled volume paths are used as a source (Crowdstrike Blog).

Impact

When exploited, this vulnerability allows containers launched through containerd's CRI implementation with specially-crafted image configurations to gain access to read-only copies of arbitrary files and directories on the host. This can bypass policy-based enforcement on container setup, including Kubernetes Pod Security Policies, potentially exposing sensitive information (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to the patched versions: containerd 1.6.1, 1.5.10, or 1.4.13. If immediate patching is not possible, users should ensure that only trusted images are used in their environment. The CrowdStrike Falcon platform provides additional protection by identifying image blob configurations with path traversal in Volume paths and preventing malicious images from being deployed to the cluster (Crowdstrike Blog, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Docker vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-22874HIGH7.5
  • DockerDocker
  • boring-registry
NoYesJun 11, 2025
CVE-2025-47907HIGH7
  • cAdvisorcAdvisor
  • nri-memcached
NoYesAug 07, 2025
CVE-2025-4673MEDIUM6.8
  • DockerDocker
  • aws-eks-pod-identity-agent-fips
NoYesJun 11, 2025
CVE-2025-54410MEDIUM5.2
  • cAdvisorcAdvisor
  • cluster-api-1.8
NoYesJul 30, 2025
CVE-2025-54388MEDIUM5.1
  • cAdvisorcAdvisor
  • apko-fips
NoYesJul 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management