CVE-2023-28840
Docker vulnerability analysis and mitigation

Overview

CVE-2023-28840 affects Moby (Docker), an open source container framework, specifically impacting its encrypted overlay networks functionality. The vulnerability was discovered in April 2023 and affects versions from 1.12.0 up to (excluding) 20.10.24 and from 23.0.0 up to (excluding) 23.0.3. The issue lies in the implementation of iptables rules for encrypted overlay networks, where administrator-set rules can take precedence over Moby's security rules, potentially allowing unencrypted datagrams to bypass security checks (Moby Advisory).

Technical details

The vulnerability stems from how Moby handles iptables rules for VXLAN (Virtual Extensible LAN) traffic in encrypted overlay networks. When setting up an encrypted overlay network endpoint, Moby installs iptables rules that rely on the u32 extension (provided by the xt_u32 kernel module) to filter VXLAN packet's VNI field. These rules are appended to the end of the INPUT filter chain, after any administrator-set rules, which can potentially override Moby's security controls (Moby Advisory). The vulnerability has a CVSS v3.1 base score of 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L) (NVD).

Impact

The vulnerability allows encrypted overlay networks to silently accept cleartext VXLAN datagrams tagged with the VNI of an encrypted overlay network. This enables attackers to inject arbitrary Ethernet frames into the encrypted overlay network through VXLAN datagram encapsulation. The impact includes potential Denial of Service attacks and the possibility for sophisticated attackers to establish unauthorized UDP or TCP connections through the container's outbound gateway, bypassing stateful firewalls (Moby Advisory).

Mitigation and workarounds

Several mitigation options are available: 1) Update to patched versions (Moby releases 23.0.3 and 20.10.24, or Mirantis Container Runtime 20.10.16), 2) Close the VXLAN port (UDP port 4789) to incoming traffic at the Internet boundary to prevent VXLAN packet injection, 3) Ensure the xt_u32 kernel module is available on all nodes of the Swarm cluster (Moby Advisory).

Additional resources


SourceThis report was generated using AI

Related Docker vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • apache-beam-java-sdk
NoYesDec 02, 2025
CVE-2025-52881HIGH7.3
  • cAdvisorcAdvisor
  • kernel-debug
NoYesNov 06, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • kyverno-notation-aws-fips
NoYesDec 03, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • aws-node-termination-handler
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • sftpgo-plugin-eventsearch
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management