Missing Encryption of Sensitive Data Affecting github.com/docker/docker package, versions >=1.12.0 <20.10.24 >=23.0.0 <23.0.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.36% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMDOCKERDOCKER-5411355
  • published 5 Apr 2023
  • disclosed 4 Apr 2023
  • credit corhere

How to fix?

Upgrade github.com/docker/docker to version 20.10.24, 23.0.3 or higher.

Overview

Affected versions of this package are vulnerable to Missing Encryption of Sensitive Data because iptables rules that enforce both incoming and outgoing IPSec to be encrypted are not created when xt_u32 is unavailable, even though the container is still attached to the network. And so, encrypted overlay networks on affected platforms silently transmit unencrypted data.

As a result, overlay networks may appear to be functional, passing traffic as expected, but without any of the expected confidentiality or data integrity guarantees.

Exploiting this vulnerability allows an attacker sitting in a trusted position on the network to read all of the application traffic that is moving across the overlay network.

Note: Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.

Workarounds

  1. Close the VXLAN port (by default, UDP port 4789) to outgoing traffic at the Internet boundary in order to prevent unintentionally leaking unencrypted traffic over the Internet.

  2. Ensure that the xt_u32 kernel module is available on all nodes of the Swarm cluster.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
6.8 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

NVD

6.8 medium
Expand this section

SUSE

6.8 medium