Browse all 4 CVE security advisories affecting Kata Containers. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Kata Containers provides secure container isolation through lightweight virtual machines, addressing the core use case of running untrusted workloads with hardware-level separation. Historically, vulnerabilities have included remote code execution flaws in its virtual machine manager and privilege escalation issues through improper access control. While no major public security incidents have been widely reported, the project maintains four CVEs on record, primarily related to container escape risks and denial-of-service vulnerabilities in its networking components. The architecture's security stems from its VM-based approach, which provides stronger isolation than traditional containers but introduces additional attack surfaces in its hypervisor and device emulation layers.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-2023 | Kata Containers - Containers have access to the guest root filesystem device — Kata ContainersCWE-250 | 3.8 | Low | 2020-06-10 |
| CVE-2020-2026 | Kata Containers - Guests can trick the kata-runtime into mounting the container image on any host path — Kata ContainersCWE-59 | 7.8 | High | 2020-06-10 |
| CVE-2020-2025 | Kata Containers - Cloud Hypervisor guests persist filesystem changes to the underlying host image file — Kata ContainersCWE-284 | 8.8 | High | 2020-05-19 |
| CVE-2020-2024 | Kata Containers - Guests can trick the kata-runtime into unmounting any mount point on the host — Kata ContainersCWE-59 | 6.5 | Medium | 2020-05-19 |
This page lists every published CVE security advisory associated with Kata Containers. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.