First published: Fri Dec 11 2020(Updated: )
Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Registry | =2.5 | |
Docker Registry | =2.5.0 | |
Docker Registry | =2.5.0-rc | |
Docker Registry | =2.5.0-rc2 | |
Docker Registry | =2.5.1 | |
Docker Registry | =2.6.0 | |
Docker Registry | =2.6.0-rc2 | |
Docker Registry | =2.6.1 | |
Docker Registry | =2.6.1-rc2 | |
Docker Registry | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29591 is a vulnerability found in versions of the Official registry Docker images through 2.7.0.
CVE-2020-29591 has a severity rating of 9.8, which is considered critical.
Versions 2.5, 2.5.0, 2.5.0-rc, 2.5.0-rc2, 2.5.1, 2.6.0, 2.6.0-rc2, 2.6.1, 2.6.1-rc2, and 2.7.0 of the Docker Registry are affected.
A remote attacker can exploit CVE-2020-29591 by using a blank password to achieve root access on systems deployed using affected versions of the Docker Registry container.
Yes, you can find references for CVE-2020-29591 at the following links: [link1], [link2], [link3].