CVE-2021-33635

9.8 CRITICAL

📋 TL;DR

CVE-2021-33635 is a critical vulnerability in iSulad container runtime where pulling malicious container images can lead to arbitrary code execution. Attackers can craft malicious images that trigger the vulnerability during the pull operation. This affects systems using iSulad container runtime with vulnerable versions.

💻 Affected Systems

Products:
  • iSulad container runtime
Versions: Versions prior to the fix in openEuler security updates
Operating Systems: openEuler Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where iSulad is used to pull container images, particularly from untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root-level code execution, allowing attackers to install persistent backdoors, exfiltrate sensitive data, or pivot to other systems.

🟠

Likely Case

Container escape leading to host system compromise, enabling attackers to access other containers, steal credentials, or deploy cryptocurrency miners.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege principles, and image signing verification are implemented.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely by tricking users into pulling malicious images from public registries.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to escalate privileges or move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to create a malicious container image and convince the target to pull it. The vulnerability is in the image processing logic during pull operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in openEuler security updates (refer to openEuler-SA-2023-1686)

Vendor Advisory: https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686

Restart Required: Yes

Instructions:

1. Update iSulad package using your package manager (yum/dnf update iSulad). 2. Restart the iSulad service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Restrict image sources

linux

Configure iSulad to only pull images from trusted, internal registries with image signing verification enabled.

Configure iSulad daemon.json to restrict registries and enable content trust

Network segmentation

all

Isolate container runtime systems from untrusted networks and implement strict egress filtering.

🧯 If You Can't Patch

  • Implement strict image signing policies and only allow signed images from trusted sources
  • Monitor and audit all image pull operations for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check iSulad version and compare against patched versions in openEuler security advisory.

Check Version:

isula version | grep -i version

Verify Fix Applied:

Verify iSulad version is updated to patched version and test pulling known safe images.

📡 Detection & Monitoring

Log Indicators:

  • Unusual image pull operations from untrusted sources
  • Failed image signature verification attempts
  • Unexpected process execution following image pulls

Network Indicators:

  • Connections to unknown container registries
  • Unusual outbound traffic patterns after image pulls

SIEM Query:

source="iSulad" AND (event="pull" OR event="image") AND (registry="*untrusted*" OR signature="failed")

🔗 References

📤 Share & Export