6.5
CVSSv3

CVE-2021-4024

Published: 23/12/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 6.5 | Impact Score: 2.5 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

podman project podman

fedoraproject fedora 34

fedoraproject fedora 35

redhat enterprise linux 8.0

Vendor Advisories

Synopsis Moderate: podman security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for podman is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as h ...
Debian Bug report logs - #1000844 libpod: CVE-2021-4024: podman machine spawns gvproxy with port binded to all IPs Package: src:libpod; Maintainer for src:libpod is Debian Go Packaging Team <pkg-go-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 30 Nov 2021 06:21: ...
A security issue was found in Podman The "podman machine" function (used to create and manage Podman virtual machine containing a Podman process) spawns a "gvproxy" process on the host system The "gvproxy" API is accessible on port 7777 on all IP addresses on the host If that port is open on the host's firewall, an attacker can potentially use " ...