Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-25621
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-06 Nov, 2025 | 18:36
Updated At-06 Nov, 2025 | 19:35
Rejected At-
▼CVE Numbering Authority (CNA)
containerd affected by a local privilege escalation via wide permissions on CRI directory

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

Affected Products
Vendor
containerd
Product
containerd
Versions
Affected
  • < 1.7.29
  • >= 2.0.0-beta.0, < 2.0.7
  • >= 2.1.0-beta.0, < 2.1.5
  • >= 2.2.0-beta.0, < 2.2.0
Problem Types
TypeCWE IDDescription
CWECWE-279CWE-279: Incorrect Execution-Assigned Permissions
Type: CWE
CWE ID: CWE-279
Description: CWE-279: Incorrect Execution-Assigned Permissions
Metrics
VersionBase scoreBase severityVector
3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w
x_refsource_CONFIRM
https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5
x_refsource_MISC
https://github.com/containerd/containerd/blob/main/docs/rootless.md
x_refsource_MISC
Hyperlink: https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5
Resource:
x_refsource_MISC
Hyperlink: https://github.com/containerd/containerd/blob/main/docs/rootless.md
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found