Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9341: Improper Link Resolution Before File Access ('Link Following')

0
Medium
VulnerabilityCVE-2024-9341cvecve-2024-9341
Published: Tue Oct 01 2024 (10/01/2024, 18:52:00 UTC)
Source: CVE

Description

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

AI-Powered Analysis

AILast updated: 01/23/2026, 19:14:38 UTC

Technical Analysis

CVE-2024-9341 is a vulnerability identified in the Go programming language's containers/common library, specifically impacting systems with FIPS mode enabled. The issue stems from improper link resolution before file access, commonly referred to as 'link following.' When container runtimes use this Go library to handle file paths, they fail to correctly validate symbolic links, allowing an attacker to manipulate these links to mount sensitive directories from the host system into a container. This effectively bypasses the fundamental security boundary between containers and the host, exposing critical host files to containerized processes. The vulnerability has a CVSS 3.1 score of 5.4, indicating medium severity, with an attack vector over the network, requiring low privileges and user interaction, and high attack complexity. The impact primarily affects confidentiality by allowing unauthorized access to host files, with limited integrity and no availability impact. No known exploits are currently reported in the wild, but the flaw is significant for environments that enforce FIPS compliance and rely on containerization for workload isolation. The vulnerability highlights the risks of symbolic link handling in container runtimes and the importance of rigorous path validation to maintain host isolation.

Potential Impact

For European organizations, this vulnerability threatens the confidentiality of sensitive data hosted on containerized systems, especially those operating in regulated sectors requiring FIPS compliance such as finance, healthcare, and government. Attackers exploiting this flaw could access critical host files, potentially leading to data leakage, exposure of credentials, or further lateral movement within the network. The breach of container isolation undermines security models that many organizations depend on to safely run multi-tenant or critical workloads. Given the increasing adoption of container technologies across Europe and the emphasis on compliance frameworks, this vulnerability could disrupt operations and erode trust in container security. The medium severity rating suggests moderate risk, but the complexity and requirement for user interaction may limit widespread exploitation. However, targeted attacks against high-value infrastructure remain a concern.

Mitigation Recommendations

Organizations should immediately audit their container runtimes and Go library versions to identify usage of the vulnerable containers/common library under FIPS mode. Applying patches or updates from Go or container runtime vendors as soon as they become available is critical. In the interim, disabling FIPS mode where feasible or restricting container runtime privileges can reduce exposure. Implement strict validation and sanitization of symbolic links and file paths in container configurations. Employ runtime security tools to monitor container file system mounts and detect anomalous link following behavior. Network segmentation and limiting user interaction with container management interfaces can further reduce attack surface. Regular security assessments and penetration testing focusing on container isolation boundaries should be conducted. Finally, organizations should maintain up-to-date inventories of containerized workloads and enforce least privilege principles to minimize potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-30T15:19:22.496Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6682

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 1/23/2026, 7:14:38 PM

Last updated: 2/7/2026, 10:41:55 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats