Multiple Container Flaws Allow Attackers to Access the Host OS

Four new vulnerabilities have been identified in containers that could allow a threat actor to escape the container and gain access to the host system. These vulnerabilities have been named “Leaky Vessels” by researchers that could potentially enable a threat actor to access sensitive data on the host systems and launch further attacks.

Source: GBHackers

 


Date:

Categorie(s):