Vulnerability Details : CVE-2016-8867
Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.
Products affected by CVE-2016-8867
- cpe:2.3:a:docker:docker:1.12.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-8867
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-8867
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-8867
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8867
-
https://www.docker.com/docker-cve-database
Docker CVE Database | DockerVendor Advisory
-
http://www.securityfocus.com/bid/94228
Docker CVE-2016-8867 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1037203
Docker Container Ambient Capability Configuration Error Lets Applications Gain Elevated Privileges - SecurityTracker
Jump to