Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-27561: n/a

0
High
VulnerabilityCVE-2023-27561cvecve-2023-27561
Published: Fri Mar 03 2023 (03/03/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

AI-Powered Analysis

AILast updated: 12/16/2025, 20:17:04 UTC

Technical Analysis

CVE-2023-27561 is a vulnerability in the runc container runtime, specifically affecting versions up to 1.1.4. The issue is an incorrect access control flaw in the libcontainer/rootfs_linux.go component, which leads to escalation of privileges on the host system. This vulnerability is a regression from a previously known issue (CVE-2019-19921), indicating that a prior fix was undone or insufficiently addressed. To exploit this vulnerability, an attacker must have the ability to spawn two containers with custom volume-mount configurations and run custom container images. This means the attacker needs some level of access to the container environment but does not require full administrative privileges on the host. The vulnerability allows the attacker to escape container isolation and gain elevated privileges on the host, potentially compromising the entire system. The CVSS v3.1 base score is 7.0 (High), with vector AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the risk remains significant due to the nature of containerized environments and the widespread use of runc as a container runtime component in Docker, Kubernetes, and other platforms. The vulnerability highlights the importance of secure container configuration, especially regarding volume mounts and image trust. Organizations relying on container technology should monitor for patches and apply them promptly to prevent potential host compromise.

Potential Impact

For European organizations, the impact of CVE-2023-27561 can be substantial, especially for those heavily utilizing containerized environments in cloud-native applications, microservices, and DevOps pipelines. Successful exploitation allows an attacker with limited container privileges to escalate to host-level privileges, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, and lateral movement within networks. Given the increasing adoption of container orchestration platforms like Kubernetes, which rely on runc as the default runtime, the vulnerability poses a risk to cloud service providers, financial institutions, healthcare providers, and government agencies in Europe. The breach of container isolation undermines the security model of containerization, increasing the attack surface. Additionally, the vulnerability could be leveraged in multi-tenant environments or shared infrastructure, amplifying the potential damage. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often reverse-engineer patches to develop exploits. Therefore, the vulnerability demands urgent attention to prevent exploitation and maintain trust in container security.

Mitigation Recommendations

1. Update runc to the latest patched version as soon as it becomes available from trusted sources or vendor distributions. 2. Restrict container creation permissions to trusted users only, minimizing the ability of unprivileged users to spawn containers with custom configurations. 3. Enforce strict image provenance policies by using signed and verified container images to prevent running untrusted or malicious images. 4. Limit or audit volume mount configurations in containers, especially those that allow mounting host directories, to reduce the risk of container escape via filesystem manipulation. 5. Implement runtime security monitoring and anomaly detection tools that can identify suspicious container behavior or privilege escalation attempts. 6. Use container security frameworks and policies (e.g., Pod Security Policies, Open Policy Agent) to enforce least privilege and secure container configurations. 7. Regularly audit container runtime versions and configurations as part of vulnerability management programs. 8. Educate DevOps and security teams about the risks of container escape vulnerabilities and best practices for secure container deployment. 9. Consider isolating critical workloads in dedicated environments with additional security controls to limit blast radius if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-03-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941bc63535cdcbc0ad63cc3

Added to database: 12/16/2025, 8:09:07 PM

Last enriched: 12/16/2025, 8:17:04 PM

Last updated: 12/17/2025, 5:04:28 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats