CVE-2025-54410
Docker vulnerability analysis and mitigation

Overview

Moby, an open source container framework developed by Docker Inc. and distributed as Docker Engine and Mirantis Container Runtime, is affected by a firewalld vulnerability in releases before 28.0.0. The vulnerability was discovered on July 29, 2025, and assigned CVE-2025-54410. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, which affects the network segmentation between containers (GitHub Advisory).

Technical details

The vulnerability occurs when firewalld is reloaded using commands like 'firewall-cmd --reload', 'killall -HUP firewalld', or 'systemctl reload firewalld'. During the reload, Docker's iptables rules are removed, and in affected versions, the rules that isolate containers in different bridge networks are not re-created. The vulnerability has been assigned a CVSS v3.1 score of 3.3 (Low) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N, indicating local access requirements and high attack complexity (GitHub Advisory, NVD).

Impact

Once the iptables rules are removed, containers gain access to any port on any container across different bridge networks on the same host. This breaks network segmentation between containers that should be isolated, creating significant risk in multi-tenant environments. However, containers running in networks created with --internal remain protected, and Docker Engine instances not running in the host's network namespace (including Rootless Mode and Docker Desktop) are unaffected (GitHub Advisory).

Mitigation and workarounds

Several workarounds are available: after reloading firewalld, users can either restart the docker daemon, re-create bridge networks, or use rootless mode. A permanent fix is available in Moby release 25.0.13, and all versions 28.0.0 and newer are not affected by this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Docker vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-22874HIGH7.5
  • DockerDocker
  • docker-cli-fips
NoYesJun 11, 2025
CVE-2025-47907HIGH7
  • DockerDocker
  • kubernetes-csi-external-provisioner
NoYesAug 07, 2025
CVE-2025-4673MEDIUM6.8
  • DockerDocker
  • golang-1.19
NoYesJun 11, 2025
CVE-2025-54410MEDIUM5.2
  • DockerDocker
  • kubeflow-katib
NoYesJul 30, 2025
CVE-2025-54388MEDIUM5.1
  • cAdvisorcAdvisor
  • beats-fips-9
NoYesJul 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management