Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9341: Improper Link Resolution Before File Access ('Link Following')

0
Medium
VulnerabilityCVE-2024-9341cvecve-2024-9341
Published: Tue Oct 01 2024 (10/01/2024, 18:52:00 UTC)
Source: CVE

Description

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

AI-Powered Analysis

AILast updated: 11/14/2025, 02:42:12 UTC

Technical Analysis

CVE-2024-9341 is a vulnerability discovered in the Go programming language's containers/common library, specifically when systems operate in FIPS (Federal Information Processing Standards) mode. The flaw stems from improper link resolution before file access, commonly referred to as 'link following.' When enabled, FIPS mode causes certain container runtimes that rely on Go to incorrectly validate file paths. This improper validation allows an attacker to exploit symbolic links (symlinks) by crafting malicious links that trick the container runtime into mounting sensitive directories from the host filesystem into the container environment. This breaks the fundamental security boundary between containers and the host, allowing unauthorized access to critical host files. The vulnerability requires the attacker to have low privileges on the system and some level of user interaction, such as triggering container creation or manipulation. The CVSS 3.1 score is 5.4 (medium), reflecting network attack vector, high complexity, low privileges required, and user interaction needed. The impact primarily affects confidentiality, as attackers can read sensitive host files, but integrity and availability impacts are limited. No public exploits have been reported yet, but the vulnerability poses a significant risk to containerized environments that rely on Go libraries in FIPS mode, especially in cloud and enterprise deployments.

Potential Impact

For European organizations, this vulnerability threatens the confidentiality of sensitive data hosted on containerized infrastructure. Many enterprises and cloud providers in Europe use container runtimes built on Go, especially in regulated sectors requiring FIPS compliance such as finance, healthcare, and government. Exploitation could lead to unauthorized disclosure of critical host files, including credentials, configuration files, or proprietary data. This undermines container isolation, potentially enabling lateral movement or privilege escalation within corporate networks. The risk is amplified in multi-tenant cloud environments where container boundaries enforce tenant separation. Although the vulnerability does not directly impact availability or integrity, the breach of confidentiality can lead to compliance violations under GDPR and other data protection regulations, resulting in legal and financial repercussions. The medium severity rating suggests that while exploitation is not trivial, the potential damage to sensitive European infrastructures is significant.

Mitigation Recommendations

1. Apply patches or updates to the Go containers/common library as soon as they become available from official sources or vendors. 2. Audit container runtime configurations to ensure FIPS mode is enabled only when necessary and verify that symbolic link handling is secure. 3. Implement strict access controls and monitoring on container creation and mount operations to detect suspicious symlink exploitation attempts. 4. Use container security tools that can detect and prevent unauthorized host directory mounts. 5. Restrict user privileges to prevent unauthorized container manipulation, minimizing the risk of low-privilege exploitation. 6. Conduct regular security assessments and penetration tests focusing on container isolation boundaries. 7. Educate DevOps and security teams about the risks of improper link resolution and enforce secure coding and deployment practices for containerized applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-30T15:19:22.496Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6682

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 11/14/2025, 2:42:12 AM

Last updated: 12/1/2025, 12:57:21 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats