CVE-2025-47290: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in containerd containerd
containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0. Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
AI Analysis
Technical Summary
CVE-2025-47290 is a high-severity vulnerability classified as a Time-of-Check to Time-of-Use (TOCTOU) race condition (CWE-367) affecting containerd version 2.1.0, a widely used container runtime component. The flaw arises during the image unpacking process when pulling container images. Specifically, a specially crafted container image can exploit the TOCTOU race condition to modify the host file system arbitrarily. This occurs because the containerd runtime performs a check on the image contents and then uses that information to unpack the image, but the state of the file system can change between these two operations, allowing an attacker to manipulate files outside the container context. The vulnerability does not require any privileges or authentication but does require user interaction in the form of pulling or importing a malicious image. The issue is fixed in containerd version 2.1.1, and users are strongly advised to upgrade to this patched version. Until then, mitigating risk involves restricting image imports to trusted users and ensuring only trusted images are used. No known exploits are currently reported in the wild, but the ease of exploitation combined with the potential for arbitrary host file system modification makes this a critical concern for environments relying on containerd 2.1.0.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of systems running containerized workloads with containerd 2.1.0. Successful exploitation could lead to unauthorized modification or corruption of host files, potentially enabling privilege escalation, data breaches, or disruption of critical services. Given the widespread adoption of container technologies in European enterprises, especially in sectors such as finance, healthcare, and critical infrastructure, the impact could be severe. Attackers could leverage this flaw to compromise container hosts, pivot within networks, or disrupt business operations. The vulnerability's network attack vector and lack of required privileges increase the risk of remote exploitation, particularly in multi-tenant or cloud environments where container images are frequently pulled from external registries. This elevates the threat landscape for European organizations that rely on containerd 2.1.0 in production or development environments.
Mitigation Recommendations
1. Immediate upgrade to containerd version 2.1.1 or later to apply the official patch that resolves the TOCTOU race condition. 2. Restrict image import and pull permissions strictly to trusted users and service accounts to reduce the risk of malicious image introduction. 3. Implement strict image provenance and signing policies to ensure only verified and trusted container images are deployed. 4. Employ runtime security tools that monitor container and host file system integrity to detect anomalous modifications. 5. Isolate container hosts and limit network exposure to reduce the attack surface. 6. Regularly audit containerd versions and configurations across environments to ensure no vulnerable versions remain in use. 7. Educate DevOps and security teams about the risks of using untrusted images and the importance of timely patching. These steps go beyond generic advice by focusing on operational controls and security hygiene specific to containerd and container image management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-47290: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in containerd containerd
Description
containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0. Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
AI-Powered Analysis
Technical Analysis
CVE-2025-47290 is a high-severity vulnerability classified as a Time-of-Check to Time-of-Use (TOCTOU) race condition (CWE-367) affecting containerd version 2.1.0, a widely used container runtime component. The flaw arises during the image unpacking process when pulling container images. Specifically, a specially crafted container image can exploit the TOCTOU race condition to modify the host file system arbitrarily. This occurs because the containerd runtime performs a check on the image contents and then uses that information to unpack the image, but the state of the file system can change between these two operations, allowing an attacker to manipulate files outside the container context. The vulnerability does not require any privileges or authentication but does require user interaction in the form of pulling or importing a malicious image. The issue is fixed in containerd version 2.1.1, and users are strongly advised to upgrade to this patched version. Until then, mitigating risk involves restricting image imports to trusted users and ensuring only trusted images are used. No known exploits are currently reported in the wild, but the ease of exploitation combined with the potential for arbitrary host file system modification makes this a critical concern for environments relying on containerd 2.1.0.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of systems running containerized workloads with containerd 2.1.0. Successful exploitation could lead to unauthorized modification or corruption of host files, potentially enabling privilege escalation, data breaches, or disruption of critical services. Given the widespread adoption of container technologies in European enterprises, especially in sectors such as finance, healthcare, and critical infrastructure, the impact could be severe. Attackers could leverage this flaw to compromise container hosts, pivot within networks, or disrupt business operations. The vulnerability's network attack vector and lack of required privileges increase the risk of remote exploitation, particularly in multi-tenant or cloud environments where container images are frequently pulled from external registries. This elevates the threat landscape for European organizations that rely on containerd 2.1.0 in production or development environments.
Mitigation Recommendations
1. Immediate upgrade to containerd version 2.1.1 or later to apply the official patch that resolves the TOCTOU race condition. 2. Restrict image import and pull permissions strictly to trusted users and service accounts to reduce the risk of malicious image introduction. 3. Implement strict image provenance and signing policies to ensure only verified and trusted container images are deployed. 4. Employ runtime security tools that monitor container and host file system integrity to detect anomalous modifications. 5. Isolate container hosts and limit network exposure to reduce the attack surface. 6. Regularly audit containerd versions and configurations across environments to ensure no vulnerable versions remain in use. 7. Educate DevOps and security teams about the risks of using untrusted images and the importance of timely patching. These steps go beyond generic advice by focusing on operational controls and security hygiene specific to containerd and container image management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-05T16:53:10.374Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeac70
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/6/2025, 6:57:37 AM
Last updated: 7/11/2025, 9:13:00 AM
Views: 20
Related Threats
CVE-2025-2800: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeventmanager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce
HighCVE-2025-2799: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeventmanager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce
MediumCVE-2025-53842: Use of hard-coded credentials in ZEXELON CO., LTD. ZWX-2000CSW2-HN
MediumCVE-2025-6977: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-53958
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.