Severity
8.4HIGH
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 6
Latest updateNov 24
Description
runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025…
CVSS vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
Affected Packages6 packages
▶CVEListV5opencontainers/runc>= 1.0.0-rc3, < 1.2.8, >= 1.3.0-rc.1, < 1.3.3, >= 1.4.0-rc.1, < 1.4.0-rc.3+2
Patches
🔴Vulnerability Details
7📋Vendor Advisories
4Red Hat
▶
Debian▶
CVE-2025-52565: runc - runc is a CLI tool for spawning and running containers according to the OCI spec...↗2025
🕵️Threat Intelligence
1💬Community
1Bugzilla▶
CVE-2025-52565 runc: container escape with malicious config due to /dev/console mount and related races↗2025-10-17