Learn about CVE-2023-28842, a vulnerability in Moby's dockerd daemon allowing injection of Ethernet frames. Find out its impact, affected versions, and steps to mitigate the risk.
This CVE involves an unauthenticated encrypted overlay network with a single endpoint in moby/moby's dockerd daemon.
Understanding CVE-2023-28842
This vulnerability affects the Moby open-source container framework developed by Docker Inc. It impacts the
dockerd
component, commonly known as Docker, and involves the overlay
network driver, a core feature of Swarm Mode.
What is CVE-2023-28842?
The vulnerability allows for the injection of arbitrary Ethernet frames into encrypted overlay networks due to the acceptance of cleartext VXLAN datagrams tagged with the VNI of an encrypted overlay network.
The Impact of CVE-2023-28842
If exploited, this vulnerability can have serious consequences, potentially leading to unauthorized access and manipulation within the encrypted overlay network.
Technical Details of CVE-2023-28842
This vulnerability has been assigned a CVSS v3.1 base score of 6.8, with a medium severity rating. It has a high attack complexity, affecting network-based attack vectors and integrity impact.
Vulnerability Description
The flaw in the encrypted overlay networks in moby/moby's dockerd daemon allows for the injection of arbitrary Ethernet frames, posing a security risk.
Affected Systems and Versions
The vulnerability impacts moby/moby versions ranging from >= 1.12.0 to < 20.10.24 and versions >= 23.0.0 to < 23.0.3. Users of these versions are at risk of exploitation.
Exploitation Mechanism
Attackers can exploit the vulnerability by injecting arbitrary Ethernet frames into encrypted overlay networks through the acceptance of cleartext VXLAN datagrams.
Mitigation and Prevention
To address CVE-2023-28842, immediate steps should be taken to secure systems and prevent unauthorized access.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that systems running affected versions of moby/moby are updated to the patched versions to prevent exploitation of the vulnerability.