Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability
Briefly

Researchers discovered a serious vulnerability in the NVIDIA Container Toolkit, tracked as CVE-2025-23359, allowing attackers to bypass container isolation and access the host system. This vulnerability affects all versions up to 1.17.3 and could lead to significant security threats such as code execution and privilege escalation. The bypass utilizes a symbolic link manipulation technique, enabling the mounting of the host's root file system into a container. The issue was initially related to an earlier vulnerability addressed in September 2024, making it critical for users to update to the latest versions to mitigate risks.
The vulnerability enables bad actors to mount the host's root file system into a container, granting them unfettered access to all files.
A successful exploit could lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
The file paths used during mount operations could be manipulated using a symbolic link, allowing access to the host from within the container.
Cloud security firm Wiz highlighted this flaw as a bypass for another vulnerability that was patched in September 2024.
Read at The Hacker News
[
|
]