CVE-2023-47633

7.5 HIGH

📋 TL;DR

Traefik's Docker integration creates an automatic route where Traefik serves as its own backend, causing 100% CPU consumption in a denial-of-service condition. This affects all Traefik deployments using Docker integration with default configuration. The vulnerability is automatically triggered by the configuration, not requiring external exploitation.

💻 Affected Systems

Products:
  • Traefik
Versions: All versions before 2.10.6 and 3.0.0-beta5
Operating Systems: All operating systems running Traefik
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using Docker integration. The default Docker integration configuration creates the vulnerable self-referencing route automatically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage due to 100% CPU consumption, making Traefik unresponsive to legitimate traffic and potentially affecting other services on the same host.

🟠

Likely Case

Service degradation or outage as the automatic route triggers CPU exhaustion, disrupting reverse proxy and load balancing functions.

🟢

If Mitigated

No impact if patched or if Docker integration is disabled or properly configured to avoid self-referencing routes.

🌐 Internet-Facing: HIGH - Internet-facing Traefik instances with Docker integration are automatically vulnerable to service disruption.
🏢 Internal Only: HIGH - Internal Traefik instances with Docker integration are equally vulnerable as the issue is configuration-based.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No exploitation required - the vulnerability triggers automatically when Traefik with Docker integration runs with default settings. This is a self-inflicted denial-of-service condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.6 or 3.0.0-beta5

Vendor Advisory: https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p

Restart Required: Yes

Instructions:

1. Stop the vulnerable Traefik instance. 2. Update to Traefik 2.10.6 or 3.0.0-beta5 using your package manager or container image. 3. Restart Traefik with the updated version.

🔧 Temporary Workarounds

Disable Docker integration

all

Remove or disable Docker provider configuration to prevent automatic route creation

Remove Docker provider from Traefik configuration or set `providers.docker = false`

Configure explicit backends

all

Manually configure routes and backends instead of relying on automatic Docker discovery

Define explicit routers and services in Traefik configuration files

🧯 If You Can't Patch

  • Disable Docker integration in Traefik configuration immediately
  • Monitor CPU usage and restart Traefik if 100% CPU consumption is detected

🔍 How to Verify

Check if Vulnerable:

Check if Traefik version is below 2.10.6 or 3.0.0-beta5 AND Docker integration is enabled in configuration

Check Version:

traefik version

Verify Fix Applied:

Confirm Traefik version is 2.10.6 or higher (or 3.0.0-beta5+) and monitor CPU usage remains normal

📡 Detection & Monitoring

Log Indicators:

  • High CPU usage alerts
  • Traefik process consuming 100% CPU
  • Service timeout or degradation logs

Network Indicators:

  • Increased response times
  • Service unavailability
  • Timeout errors from Traefik

SIEM Query:

process_name:"traefik" AND cpu_usage:>95

🔗 References

📤 Share & Export