The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Missing Encryption of Sensitive Data vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/docker/docker
to version 20.10.24, 23.0.3 or higher.
Affected versions of this package are vulnerable to Missing Encryption of Sensitive Data because iptables
rules that enforce both incoming and outgoing IPSec to be encrypted are not created when xt_u32
is unavailable, even though the container is still attached to the network. And so, encrypted overlay networks on affected platforms silently transmit unencrypted data.
As a result, overlay
networks may appear to be functional, passing traffic as expected, but without any of the expected confidentiality or data integrity guarantees.
Exploiting this vulnerability allows an attacker sitting in a trusted position on the network to read all of the application traffic that is moving across the overlay network.
Note: Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.
Close the VXLAN port (by default, UDP port 4789) to outgoing traffic at the Internet boundary in order to prevent unintentionally leaking unencrypted traffic over the Internet.
Ensure that the xt_u32
kernel module is available on all nodes of the Swarm cluster.