CVE-2024-23653
Docker vulnerability analysis and mitigation

Overview

CVE-2024-23653 is a vulnerability discovered in BuildKit versions up to v0.12.4, affecting the Interactive Containers API. The vulnerability allows attackers to run containers with elevated privileges, bypassing the normal security restrictions that require the security.insecure entitlement to be enabled in both buildkitd configuration and user build request (Snyk Blog, GitHub Advisory).

Technical details

The vulnerability occurs in BuildKit's GRPC endpoint when called using a custom syntax format. The Container.Start endpoint does not validate the StartRequest.SecurityMode argument against BuildKit configuration expectations. This allows parsing Docker images to launch elevated privilege containers during build time (Snyk Blog).

Impact

When successfully exploited, the vulnerability allows an attacker to execute a privileged container that can use its elevated privileges (such as full Linux capabilities) to escape from the container and achieve full host root command execution (Snyk Blog).

Mitigation and workarounds

The vulnerability has been patched in BuildKit v0.12.5, Moby (Docker Engine) v25.0.2, and Docker Desktop v4.27.1. Organizations are advised to update to these versions or later. As a workaround, it is recommended to avoid using BuildKit frontends from untrusted sources, as these are typically specified in the #syntax line of Dockerfiles or with the --frontend flag when using buildctl build command (GitHub Advisory, Wiz Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management