Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Docker CVE-2026-34040 allows attackers to bypass authentication and gain host access

Over 1,000 exposed ComfyUI instances targeted by cryptomining botnet campaign

Hermeus raises $350 million to develop autonomous hypersonic fighter jet

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Docker CVE-2026-34040 allows attackers to bypass authentication and gain host access
Identity

Docker CVE-2026-34040 allows attackers to bypass authentication and gain host access

By April 7, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 7, 2026Vulnerabilities / DevSecOps

A high-severity security vulnerability has been disclosed in Docker Engine that could allow an attacker to bypass the authentication plugin (AuthZ) under certain circumstances.

This vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), results from an incomplete remediation of CVE-2024-41110, the highest severity vulnerability in the same component that was disclosed in July 2024.

“An attacker could use a specially crafted API request to cause the Docker daemon to forward the request to the authorization plugin without the body,” Docker Engine maintainers said in an advisory released late last month. “Authorization plugins may allow requests that would have been denied if the body had been forwarded.”

“Those who rely on authorization plugins that introspect the request body to make access control decisions are potentially affected.”

Multiple security vulnerabilities are credited with independently discovering and reporting this bug, including Asim Viladi Oglu Manizada, Cody, Oleh Konko, and Vladimir Tokarev. This issue has been patched in Docker Engine version 29.3.1.

According to a report published by Cyera Research Labs researcher Tokarev, the vulnerability stems from the fact that the fix for CVE-2024-41110 did not properly handle HTTP request bodies that are too large, thus opening the door to a scenario where a single padded HTTP request could be used to create a privileged container with access to the host file system.

In a hypothetical attack scenario, an attacker whose Docker API access is restricted by the AuthZ plugin could pad the container creation request to more than 1MB, weakening the mechanism and causing the container creation request to be dropped before it reaches the plugin.

“The plugin does not find anything to block, so it allows the request,” Tokarev said in a report shared with Hacker News. “The Docker daemon handles the entire request and creates a privileged container with root access to the host (AWS credentials, SSH keys, Kubernetes configuration, and everything else on the machine). This works for all AuthZ plugins in the ecosystem.”

Additionally, artificial intelligence (AI) coding agents like OpenClaw running within a Docker-based sandbox can be tricked into performing hidden prompt injections within specially created GitHub repositories as part of their normal developer workflow, resulting in the execution of malicious code that exploits CVE-2026-34040, bypassing authentication using the approaches described above, and creating privileged containers to host files. Mount the system.

With this level of access in place, attackers can extract cloud service credentials and use them to gain control over SSH to cloud accounts, Kubernetes clusters, and even production servers.

That’s not the end. Cyera also warned that if an error occurs while attempting to access a file such as kubeconfig as part of a legitimate debugging task issued by a developer (such as debugging an out-of-memory issue on K8s), the AI ​​agent could figure out a bypass on its own and trigger a bypass by constructing a padded HTTP request. This approach eliminates the need to plant contaminated repositories containing malicious instructions.

“The AuthZ plugin rejected the mount request,” Cyera explained. “Agents have access to the Docker API and know how HTTP works. CVE-2026-34040 requires no exploit code, privileges, or special tools. It is a single HTTP request with additional padding. It can be constructed by any agent who can read the Docker API documentation.”

As a temporary workaround, we recommend avoiding the use of AuthZ plugins that rely on request body inspection for security decisions, restricting access to the Docker API to trusted parties following the principle of least privilege, or running Docker in rootless mode.

“In rootless mode, even the ‘root’ of a privileged container is mapped to an unprivileged host UID,” Tokarev said. “The explosion range goes from ‘Complete Host Compromise’ to ‘Unprivileged User Compromise.’ For environments that cannot be completely rootless, –userns-remap provides similar UID mapping. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOver 1,000 exposed ComfyUI instances targeted by cryptomining botnet campaign

Related Posts

Over 1,000 exposed ComfyUI instances targeted by cryptomining botnet campaign

April 7, 2026

[Webinar] How to close the identity gap in 2026 before AI exploits enterprise risks

April 7, 2026

The hidden cost of repeated credential incidents

April 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Docker CVE-2026-34040 allows attackers to bypass authentication and gain host access

Over 1,000 exposed ComfyUI instances targeted by cryptomining botnet campaign

Hermeus raises $350 million to develop autonomous hypersonic fighter jet

[Webinar] How to close the identity gap in 2026 before AI exploits enterprise risks

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.