CVE-2025-54388
cAdvisor vulnerability analysis and mitigation

Overview

Moby, an open source container framework developed by Docker Inc. and distributed as Docker Engine and Mirantis Container Runtime, has been found to contain a vulnerability (CVE-2025-54388) affecting versions 28.2.0 through 28.3.2. The vulnerability was discovered on July 29, 2025, and involves a firewall state management issue where container ports become accessible from remote machines after a firewalld reload, even when they should be restricted to localhost access (GitHub Advisory).

Technical details

When the firewalld service is reloaded, it removes all iptables rules, including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. The vulnerability has been assigned a CVSS v4.0 base score of 5.1 (Medium) with the vector string CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N. The issue is specifically related to the reapplyPerPortIptables function in the bridge network driver (GitHub Commit).

Impact

After a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. For example, if a Docker host has address 192.168.0.10 and a bridge network with subnet 172.17.0.0/16, a remote host in the local network can gain access to published ports by adding a route to the container network. The vulnerability only affects explicitly published ports, while unpublished ports remain protected (GitHub Advisory).

Mitigation and workarounds

The issue has been fixed in version 28.3.3. For affected versions, several workarounds are available: restart the docker daemon after reloading firewalld, re-create bridge networks, or use rootless mode. Notably, Moby releases older than 28.2.0 are not affected by this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related cAdvisor vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-22871CRITICAL9.1
  • cAdvisorcAdvisor
  • cluster-autoscaler-1.30
NoYesApr 08, 2025
CVE-2025-22869HIGH7.5
  • cAdvisorcAdvisor
  • mongo-tools
NoYesFeb 26, 2025
CVE-2025-22872MEDIUM6.5
  • cAdvisorcAdvisor
  • opentofu-fips-1.8
NoYesApr 16, 2025
CVE-2025-54388MEDIUM5.1
  • cAdvisorcAdvisor
  • spire-server
NoYesJul 30, 2025
CVE-2025-22870MEDIUM4.4
  • cAdvisorcAdvisor
  • fuse-overlayfs-snapshotter
NoYesMar 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management