CVE-2025-54388: Moby firewalld reload makes published container ports accessible from remote hosts
N/A
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version | 
|---|---|---|---|
| github.com/docker/docker | go | >= 28.2.0, < 28.3.3 | 28.3.3 | 
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is caused by an incomplete restoration of iptables rules after a firewalld reload. The analysis of the provided patch pinpoints the exact location of the flaw. The commit bea959c7b793b32a893820b97c4eadc7c87fabb0 modifies the reapplyPerPortIptables function in libnetwork/drivers/bridge/port_mapping_linux.go. The change explicitly adds the missing logic to re-add endpoint-specific firewall rules, which were previously not being restored. The original function only restored port mapping rules, leaving a security gap. Therefore, the reapplyPerPortIptables function is identified as the vulnerable function because it is the one that fails to perform the necessary security-critical operation, leading to the exposure of container ports.