CVE-2025-54388
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-30

Last updated on: 2025-09-08

Assigner: GitHub, Inc.

Description
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-30
Last Modified
2025-09-08
Generated
2026-05-07
AI Q&A
2025-07-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mobyproject moby From 28.2.0 (inc) to 28.3.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-909 The product does not initialize a critical resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in Moby versions 28.2.0 through 28.3.2 when the firewalld service is reloaded. The reload removes all iptables rules, including those created by Docker. Although Docker is supposed to recreate these rules automatically, versions before 28.3.3 fail to restore the specific rules that block external access to containers. As a result, containers with ports published to localhost (e.g., 127.0.0.1:8080) become accessible from remote machines that can route to the Docker bridge, even though they should only be accessible from the host itself. Unpublished ports remain protected. This issue is fixed in version 28.3.3.


How can this vulnerability impact me? :

The vulnerability can expose containers that are intended to be accessible only from the local host to remote network access. This could allow unauthorized remote users to connect to services running inside containers on ports that were only published to localhost, potentially leading to unauthorized access, data exposure, or exploitation of containerized applications.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Moby to version 28.3.3 or later, where the issue is fixed. Until then, avoid reloading the firewalld service or manually verify and restore iptables rules that block external access to published container ports after a firewalld reload.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart