Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby releases before 28.0.0. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, allowing any container to access all ports on any other container across different bridge networks on the same host. This breaks network segmentation between containers that should be isolated, creating significant risk in multi-tenant environments. Only containers in --internal networks remain protected.
Workarounds include reloading firewalld and either restarting the docker daemon, re-creating bridge networks, or using rootless mode. Maintainers anticipate a fix for this issue in version 25.0.13.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Docker
Docker engine Docker moby Mirantis Mirantis mirantis Container Runtime Mobyproject Mobyproject moby |
|
Vendors & Products |
Docker
Docker engine Docker moby Mirantis Mirantis mirantis Container Runtime Mobyproject Mobyproject moby |
Thu, 31 Jul 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 30 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby releases before 28.0.0. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, allowing any container to access all ports on any other container across different bridge networks on the same host. This breaks network segmentation between containers that should be isolated, creating significant risk in multi-tenant environments. Only containers in --internal networks remain protected. Workarounds include reloading firewalld and either restarting the docker daemon, re-creating bridge networks, or using rootless mode. Maintainers anticipate a fix for this issue in version 25.0.13. | |
Title | Moby's Firewalld reload removes bridge network isolation | |
Weaknesses | CWE-909 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-30T13:24:50.818Z
Updated: 2025-07-30T13:38:40.357Z
Reserved: 2025-07-21T23:18:10.280Z
Link: CVE-2025-54410

Updated: 2025-07-30T13:37:53.878Z

Status : Awaiting Analysis
Published: 2025-07-30T14:15:28.900
Modified: 2025-07-31T18:42:37.870
Link: CVE-2025-54410
