Critical runC Vulnerabilities Allow Container Escape in Docker, Kubernetes

runc vulnerabilities container escape Docker security Kubernetes security CVE-2025-31133 CVE-2025-52565 CVE-2025-52881
Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
November 11, 2025 4 min read

TL;DR

  • This article details three critical vulnerabilities in runC, the container runtime for Docker and Kubernetes. These flaws (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) allow attackers to break container isolation and gain root access on host systems. It outlines affected and fixed versions, explains attack vectors, and provides essential mitigation strategies including immediate patching and security hardening.

runC Vulnerabilities Allow Container Isolation Bypass

Three severe vulnerabilities in runc, the container runtime powering Docker and Kubernetes, enable attackers to break container isolation and achieve root access on host systems. The flaws were disclosed by a SUSE researcher on November 5, 2025, affecting containerized environments worldwide.

The three CVEs—CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881—exploit weaknesses in runc’s mount operations and file protections during container creation. Attackers can leverage race conditions and symbolic link manipulation to bypass security restrictions, gaining the ability to write to critical system files that facilitate container escape. More details on GitHub Security Advisories.

Affected and Fixed Versions

CVE ID Affected Versions Fixed Versions
CVE-2025-31133 All known versions 1.2.8, 1.3.3, 1.4.0-rc.3+
CVE-2025-52565 1.0.0-rc3 and later 1.2.8, 1.3.3, 1.4.0-rc.3+
CVE-2025-52881 All known versions 1.2.8, 1.3.3, 1.4.0-rc.3+

vulnerable versions

Image courtesy of Cyberpress.org

Patched versions are available in runC versions 1.2.8, 1.3.3, 1.4.0-rc.3, and later.

Attack Vectors and Technical Details

The most likely attack vector involves malicious container images or Dockerfiles with custom mount configurations. Each vulnerability works differently to circumvent container security. Sysdig shares that attempts to exploit any of the three security issues can be detected by monitoring suspicious symlink behaviors.

  • CVE-2025-31133 targets the maskedPaths feature, which prevents containers from accessing sensitive host files. Attackers replace /dev/null with a symbolic link during container creation, tricking runc into mounting arbitrary host paths. This allows writes to critical files like /proc/sys/kernel/core_pattern, enabling system compromise. More on GHSA-9493-h29p-rfm2.
  • CVE-2025-52565 exploits insufficient validation during /dev/pts/$n mounting to /dev/console. The vulnerability permits attackers to redirect mounts before security protections activate, granting unauthorized write access to protected procfs files. This bypass undermines container isolation boundaries. Details on GHSA-qw9x-cqr3-wc7r.
  • CVE-2025-52881 abuses race conditions with shared mounts to redirect runc writes to /proc files. Attackers can manipulate dangerous system files such as /proc/sysrq-trigger, potentially crashing systems or enabling container escape through privilege escalation. See GHSA-cgrx-mc8f-2prm for more.

Mitigation and Detection

Organizations running Docker, Kubernetes, or any services using runc must upgrade immediately to patched versions 1.2.8, 1.3.3, or 1.4.0-rc.3 and later. The widespread use of runc across containerized infrastructure makes these vulnerabilities particularly dangerous.

RunC developers also shared mitigation actions, which include activating user namespaces for all containers without mapping the host root user into the container's namespace. This precaution should block the most important parts of the attack because of the Unix DAC permissions that would prevent namespaced users from accessing relevant files. More information can be found on Sysdig.

Sysdig also recommends using rootless containers, if possible, to reduce the potential damage from exploiting a vulnerability. Additional mitigations and detections are available.

Container operators should audit deployed environments for suspicious mount configurations and monitor for container escape attempts. Additionally, organizations should implement strict image scanning policies to detect malicious Dockerfiles attempting these exploitation techniques. More information on container security.

Falco Rule for Detection

Sysdig Secure and Falco users can detect exploitation of these vulnerabilities by monitoring suspicious symlink behaviors. The Falco rule shown below is experimental and can detect CVE-2025-31133 and CVE-2025-52565 activity. More details on Falco.

- rule: Create Symlink Over Procfs Files
 desc: This rule detects the creation of symbolic links over sensitive files, which could lead to container escape when runc is vulnerable to CVE-2025-31133 and CVE-2025-52565. An attacker could exploit these vulnerabilities to escape from container boundaries or cause a denial-of-service attack.
 condition: >
 create_symlink and
 ((evt.arg.target in ("/proc/sysrq-trigger", "/proc/sys/kernel/core_pattern") and evt.arg.linkpath contains "/dev/null") or
 (evt.arg.target in ("/proc/sysrq-trigger", "/proc/sys/kernel/core_pattern") and evt.arg.linkpath startswith "/dev/pts/"))
 output: >
 Symlinks created over files that could lead to container escape in runc as per CVE-2025-31133 and CVE-2025-52565 by process %proc.name with parent %proc.pname under user %user.name executed on %container.name (evt.arg.target=%evt.arg.target evt.arg.linkpath=%evt.arg.linkpath proc.name=%proc.name proc.cmdline=%proc.cmdline proc.exepath=%proc.exepath proc.pname=%proc.pname proc.pcmdline=%proc.pcmdline proc.pexepath=%proc.pexepath gparent=%proc.aname[2] user.name=%user.name image=%container.image.repository:%container.image.tag proc.pid=%proc.pid proc.cwd=%proc.cwd proc.ppid=%proc.ppid proc.sid=%proc.sid user.uid=%user.uid user.loginname=%user.loginname group.name=%group.name container.id=%container.id container.name=%container.name)
 priority: CRITICAL
 tags: [host]

Remediation Steps

Affected organizations should upgrade runC to version 1.1.12 or later, which remediates all three CVEs. Distributions that bundle runC — such as containerd, Docker Engine, and Kubernetes distributions like GKE or EKS — are also rolling out patched versions. More information on patching and mitigation.

Security teams should:

  1. Identify and inventory all assets that rely on runC and container runtimes.
  2. Apply vendor patches or rebuild container runtimes with the updated runC.
  3. Audit workloads for excessive privileges and container configurations that enable volume mounts or host path access.
  4. Implement runtime protections such as SELinux, AppArmor, and seccomp profiles to provide defense-in-depth against container exploits.
  5. Use container security tools to monitor for suspicious behavior at the host-container boundary. More on container security tools.

Official GitHub Security Advisories

  • GHSA-9493-h29p-rfm2 (CVE-2025-31133)
  • GHSA-qw9x-cqr3-wc7r (CVE-2025-52565)
  • GHSA-cgrx-mc8f-2prm (CVE-2025-52881)
Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview
OpenSSL vulnerability

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

Urgent: OpenSSL 3.x vulnerable to CVE-2025-15467, enabling pre-auth RCE. Learn affected versions, impact, and immediate mitigation steps. Protect your systems now!

By Divyansh Ingle March 10, 2026 4 min read
common.read_full_article
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article