CVE-2021-33637

8.4 HIGH

📋 TL;DR

CVE-2021-33637 is a container escape vulnerability in iSulad's isula export command. When an attacker controls a container, they can exploit this flaw to break out of the container and potentially access the host system. This affects systems running vulnerable versions of iSulad container runtime.

💻 Affected Systems

Products:
  • iSulad container runtime
Versions: Versions prior to the fix in openEuler-SA-2023-1686
Operating Systems: openEuler Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using iSulad with the isula export functionality. Requires attacker to have control over a container.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full container escape leading to host system compromise, allowing attacker to execute arbitrary code, access sensitive data, or pivot to other systems.

🟠

Likely Case

Container escape enabling unauthorized access to host filesystem, potentially leading to data theft or further privilege escalation.

🟢

If Mitigated

Limited impact if proper container isolation and security controls are implemented, though escape attempt may still be detected.

🌐 Internet-Facing: MEDIUM - Requires attacker to already have container access, but internet-facing containers could be initial entry point.
🏢 Internal Only: HIGH - Internal attackers with container access can exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to have control over a container and knowledge of the vulnerability. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in openEuler-SA-2023-1686

Vendor Advisory: https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686

Restart Required: Yes

Instructions:

1. Update iSulad package to version containing fix from openEuler-SA-2023-1686. 2. Restart iSulad service. 3. Verify no containers are using vulnerable functionality.

🔧 Temporary Workarounds

Disable isula export command

linux

Remove or restrict access to the isula export command to prevent exploitation.

chmod -x /usr/bin/isula-export
rm /usr/bin/isula-export

Implement container security policies

linux

Use container security tools like SELinux, AppArmor, or seccomp to restrict container capabilities.

setenforce 1
apparmor_parser -r /etc/apparmor.d/containers

🧯 If You Can't Patch

  • Implement strict container isolation using namespaces and cgroups
  • Monitor for suspicious container export activities and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check iSulad version and compare with patched version from openEuler-SA-2023-1686 advisory.

Check Version:

isula version | grep -i version

Verify Fix Applied:

Verify iSulad version is updated and test container export functionality in controlled environment.

📡 Detection & Monitoring

Log Indicators:

  • Unusual isula export command usage
  • Container escape attempts in audit logs
  • Unexpected file access from containers

Network Indicators:

  • Suspicious outbound connections from container hosts
  • Unexpected network traffic patterns

SIEM Query:

source="iSulad" AND (command="export" OR action="escape")

🔗 References

📤 Share & Export