PT-2025-31369 · Docker +3 · Docker Engine +5
Vvoland
·
Published
2025-07-29
·
Updated
2025-07-31
·
CVE-2025-54410
3.3
Low
Base vector | Vector | AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions:
Moby versions prior to 28.0.0
Moby version 25.0.13
Description:
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby, where reloading firewalld causes Docker to fail to re-create iptables rules that isolate bridge networks. This allows containers to access any port on any other container across different bridge networks on the same host, breaking network segmentation between containers. Containers in `--internal` networks remain protected.
Recommendations:
Update to Moby version 28.0.0 or later.
Apply the fix available in Moby release 25.0.13.
As a temporary workaround, restart the docker daemon after reloading firewalld.
As a temporary workaround, re-create bridge networks after reloading firewalld.
As a temporary workaround, use rootless mode.
Fix
Weakness Enumeration
Related Identifiers
Affected Products
References · 15
- https://osv.dev/vulnerability/CVE-2025-54410 · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/docker.io · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-54410 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-4vq8-7jfc-9cvp · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54410 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54410 · Security Note
- https://github.com/moby/moby⭐ 70399 🔗 18792 · Note
- https://github.com/moby/moby/security/advisories/GHSA-4vq8-7jfc-9cvp⭐ 70399 🔗 18792 · Note
- https://packages.debian.org/src:docker.io · Note
- https://redos.red-soft.ru/support/secure/uyazvimosti/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2025-54410 · Note
- https://t.me/CVEtracker/28741 · Telegram Post
- https://firewalld.org/documentation/howto/reload-firewalld.html · Note
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54410 · Note
- https://twitter.com/VulmonFeeds/status/1950571643694199072 · Twitter Post
- https://twitter.com/CVEnew/status/1950549254579106138 · Twitter Post