Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9341: Improper Link Resolution Before File Access ('Link Following')

0
Medium
VulnerabilityCVE-2024-9341cvecve-2024-9341
Published: Tue Oct 01 2024 (10/01/2024, 18:52:00 UTC)
Source: CVE

Description

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:47:36 UTC

Technical Analysis

CVE-2024-9341 is a vulnerability discovered in the Go programming language's containers/common library, specifically affecting container runtimes operating with FIPS mode enabled. The flaw arises from improper link resolution before file access, commonly referred to as 'link following'. When container runtimes process file paths, they rely on the containers/common Go library to validate and resolve symbolic links securely. However, due to inadequate validation, an attacker can craft malicious symbolic links that cause the container runtime to mount sensitive directories from the host system inside the container environment. This effectively bypasses the fundamental isolation boundary between containers and the host, allowing unauthorized access to critical host files. The vulnerability has a CVSS 3.1 base score of 5.4, indicating medium severity, with the vector AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N. This means the attack can be performed remotely over the network but requires low privileges and user interaction, with high attack complexity. The impact on confidentiality is high because sensitive host files can be accessed, while integrity impact is low and availability is not affected. No patches or exploits are currently publicly available, but the vulnerability is published and enriched by CISA. This issue is particularly relevant for organizations using Go-based container runtimes in environments where FIPS mode is mandated for compliance, such as government or regulated industries.

Potential Impact

The primary impact of CVE-2024-9341 is the compromise of confidentiality through unauthorized access to sensitive host files by exploiting container isolation weaknesses. Organizations relying on containerization for workload segregation and security may face data breaches or leakage of critical configuration and credential files from the host system. This can lead to further lateral movement, privilege escalation, or exposure of sensitive intellectual property. The integrity of host files is less impacted, but the breach of isolation boundaries undermines trust in container security models. Availability is not directly affected. The medium CVSS score reflects the need for user interaction and higher attack complexity, which somewhat limits exploitation likelihood. However, environments with automated container deployments and FIPS mode enabled are at heightened risk. The vulnerability could disrupt compliance with security standards requiring strict isolation and data protection. Attackers targeting cloud providers, managed container services, or enterprises with containerized workloads could leverage this flaw to gain footholds or exfiltrate data.

Mitigation Recommendations

To mitigate CVE-2024-9341, organizations should first monitor vendor advisories for patches to the containers/common Go library and apply updates promptly once available. Until patches are released, administrators should consider disabling FIPS mode in container runtimes if feasible, or restrict container deployment to trusted users and workloads only. Implement strict path validation and symbolic link resolution policies within container runtimes to prevent unauthorized link traversal. Employ runtime security tools that monitor container file system access patterns and alert on suspicious mount operations. Use container security frameworks that enforce least privilege and limit container capabilities to reduce the attack surface. Conduct regular audits of container configurations and host file system permissions to ensure no inadvertent exposure. Network segmentation and multi-factor authentication can help reduce the risk of attacker footholds needed for exploitation. Finally, educate developers and operators about the risks of symbolic link attacks in container environments and encourage secure coding and deployment practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-30T15:19:22.496Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6682

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 3/20/2026, 1:47:36 AM

Last updated: 3/25/2026, 4:23:05 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses