Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby releases before 28.0.0. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, allowing any container to access all ports on any other container across different bridge networks on the same host. This breaks network segmentation between containers that should be isolated, creating significant risk in multi-tenant environments. Only containers in --internal networks remain protected. Workarounds include reloading firewalld and either restarting the docker daemon, re-creating bridge networks, or using rootless mode. Maintainers anticipate a fix for this issue in version 25.0.13.
History

Thu, 31 Jul 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Docker
Docker engine
Docker moby
Mirantis
Mirantis mirantis Container Runtime
Mobyproject
Mobyproject moby
Vendors & Products Docker
Docker engine
Docker moby
Mirantis
Mirantis mirantis Container Runtime
Mobyproject
Mobyproject moby

Thu, 31 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Wed, 30 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Description Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby releases before 28.0.0. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, allowing any container to access all ports on any other container across different bridge networks on the same host. This breaks network segmentation between containers that should be isolated, creating significant risk in multi-tenant environments. Only containers in --internal networks remain protected. Workarounds include reloading firewalld and either restarting the docker daemon, re-creating bridge networks, or using rootless mode. Maintainers anticipate a fix for this issue in version 25.0.13.
Title Moby's Firewalld reload removes bridge network isolation
Weaknesses CWE-909
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-30T13:24:50.818Z

Updated: 2025-07-30T13:38:40.357Z

Reserved: 2025-07-21T23:18:10.280Z

Link: CVE-2025-54410

cve-icon Vulnrichment

Updated: 2025-07-30T13:37:53.878Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-30T14:15:28.900

Modified: 2025-07-31T18:42:37.870

Link: CVE-2025-54410

cve-icon Redhat

Severity : Low

Publid Date: 2025-07-30T13:24:50Z

Links: CVE-2025-54410 - Bugzilla