CVE-2024-25621

HIGH

containerd <1.7.28, <2.0.6, <2.1.4, <2.2.0-rc.1 - Privilege Escalation

Title source: llm
STIX 2.1

Description

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

Scores

CVSS v3 7.3
EPSS 0.0000
EPSS Percentile 0.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-279
Status published
Products (4)
containerd/containerd 0 - 1.7.29Go
containerd/containerd 0 - 2.0.7Go
linuxfoundation/containerd 2.2.0 beta0 (5 CPE variants)
linuxfoundation/containerd < 1.7.29
Published Nov 06, 2025
Tracked Since Feb 18, 2026