CVE-2024-41110 Overview
Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances.
Critical Impact
This vulnerability could lead to unauthorized actions, including privilege escalation, by bypassing AuthZ plugins.
Affected Products
- Docker Engine (specific versions impacted)
- Mirantis Container Runtime (not vulnerable)
- Docker EE v19.03.x (not vulnerable)
Discovery Timeline
- 2018 - Vulnerability discovered (researcher name not provided)
- January 2019 - Vulnerability fixed in Docker Engine v18.09.1 (vendor name not provided)
- 2024-07-24 - CVE CVE-2024-41110 published to NVD
- 2024-11-21 - Last updated in NVD database
Technical Details for CVE-2024-41110
Vulnerability Analysis
The vulnerability arises from a regression in Docker Engine, where a specially-crafted API request could bypass authorization plugins by not forwarding the body of the request or response to these plugins. This loophole allows malicious actions to be authorized inadvertently.
Root Cause
The root cause is an oversight during the update process where fixes from v18.09.1 were not carried forward into later versions.
Attack Vector
The attack vector is network-based, exploiting the Docker Engine API to bypass authorization mechanisms.
// Example exploitation code (sanitized)
fetch('/path/to/api', {
method: 'POST',
headers: {
'Content-Type': 'application/json',
},
body: JSON.stringify({}) // Potentially empty or malformed
})
.then(response => response.json())
.then(data => console.log(data));
Detection Methods for CVE-2024-41110
Indicators of Compromise
- Unauthorized API requests
- Unusual access logs
- Suspicious request patterns
Detection Strategies
Implement monitoring for API endpoint access logs to detect anomalies and unauthorized bypass attempts. Look for patterns that match known bypass techniques.
Monitoring Recommendations
Regularly audit authorization plugin logs and cross-reference with Docker Engine logs to detect unauthorized access indicators.
How to Mitigate CVE-2024-41110
Immediate Actions Required
- Update to docker-ce v27.1.1 or later
- Restrict Docker API access to trusted parties
- Disable or avoid using vulnerable AuthZ plugins
Patch Information
Patches are available in docker-ce v27.1.1 and later. Ensure the Docker Engine version in use includes updates from the fixed branches.
Workarounds
Restrict Docker API access by configuring network firewall rules or using VPNs to limit requests to trusted sources.
# Configuration example
iptables -A INPUT -p tcp --dport 2375 -s TRUSTED_IP --jump ACCEPT
iptables -A INPUT -p tcp --dport 2375 --jump DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

