<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Container-Escape — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/container-escape/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 12:45:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/container-escape/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Chroot Container Escape via Mount</title><link>https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</guid><description>The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>This detection rule monitors for a specific sequence of commands on Linux systems that could indicate an attempt to escape a containerized environment. The attack involves first mounting a file system, typically targeting the host&rsquo;s root file system, and then using the <code>chroot</code> command to change the root directory. This combination, if successful, allows an attacker inside a container to gain unauthorized access to the host system. The rule is designed to identify this uncommon behavior pattern, which is a strong indicator of malicious activity. The rule is applicable to environments utilizing Elastic Defend, SentinelOne Cloud Funnel, and Crowdstrike FDR. The detection looks for this sequence occurring within a 5-minute timeframe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through exploiting a vulnerability or misconfiguration in the application running within the container.</li>
<li>The attacker attempts to mount the host&rsquo;s root filesystem within the container using the <code>mount</code> command, often targeting <code>/dev/sd*</code> devices. This requires sufficient privileges within the container, or the exploitation of a container escape vulnerability to gain such privileges.</li>
<li>The <code>mount</code> command is executed with arguments specifying the device to mount and the mount point within the container&rsquo;s file system.</li>
<li>The attacker then executes the <code>chroot</code> command, changing the root directory of the current process to the mounted host&rsquo;s root filesystem.</li>
<li>After successfully executing <code>chroot</code>, the attacker&rsquo;s perspective shifts to the host&rsquo;s file system, allowing them to access and modify sensitive files and configurations.</li>
<li>The attacker uses their newly acquired access to install backdoors, create new user accounts with elevated privileges, or modify system configurations to establish persistence.</li>
<li>The attacker may attempt to move laterally to other containers or systems within the network, leveraging their compromised position on the host.</li>
<li>The final objective is to gain complete control over the host system and potentially the entire infrastructure, leading to data exfiltration, system disruption, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can have severe consequences, potentially leading to complete compromise of the host system and the data it contains. Depending on the environment, this could affect a single server or spread to many hosts. The compromise of containerized environments can lead to data breaches, service disruption, and reputational damage. Given the sensitive nature of data often processed within containers, the impact can range from financial losses to regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential container escapes.</li>
<li>Enable Elastic Defend integration to collect process data, and ensure Session View data is enabled to enhance visibility as mentioned in the setup guide.</li>
<li>Review and harden container configurations to minimize privileges granted to containerized processes, reducing the attack surface for escape attempts.</li>
<li>Implement network segmentation to limit the potential for lateral movement following a successful container escape.</li>
<li>Monitor process execution logs for unusual mount and chroot command sequences within container environments using Elastic Defend, SentinelOne, and Crowdstrike logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category></item><item><title>Chroot Execution in Container Context on Linux</title><link>https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</guid><description>Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of the <code>chroot</code> command being executed within a Linux containerized environment. It leverages process execution telemetry from Elastic Defend and Auditd Manager to detect potential container escape attempts. The rule focuses on processes where the name is <code>chroot</code> or the command-line arguments contain <code>chroot</code>. Container context is determined by identifying processes with a title matching <code>runc init</code>, a container workload entry leader, or <code>runc</code> as the parent process. Successful container escapes can allow attackers to gain unauthorized access to the host system. The technique is often combined with sensitive host mounts, which are then leveraged after the <code>chroot</code> to access files and processes outside the container.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, potentially through exploiting a vulnerability in the containerized application.</li>
<li>The attacker identifies sensitive host mounts within the container&rsquo;s filesystem, such as <code>/host</code>, <code>/proc/1/root</code>, or other unexpected node paths.</li>
<li>The attacker executes the <code>chroot</code> command, specifying an alternate root filesystem, typically a host-linked mount.</li>
<li>The <code>chroot</code> command redirects system calls to the new root filesystem, effectively isolating the attacker from the container&rsquo;s original environment.</li>
<li>The attacker leverages the new root filesystem to access files, directories, and processes on the host system outside the container&rsquo;s boundaries.</li>
<li>The attacker may then attempt to escalate privileges by exploiting vulnerabilities in host system services or binaries.</li>
<li>The attacker may install malware or establish persistence mechanisms on the host system.</li>
<li>The attacker uses the compromised host system to pivot to other systems on the network or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can lead to full compromise of the underlying host system, potentially impacting all containers running on the same host. This can enable attackers to access sensitive data, disrupt services, and move laterally within the network. In multi-tenant environments, a container escape can compromise the security of other tenants sharing the same infrastructure. A single successful container escape can lead to a widespread breach impacting numerous systems and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Chroot Execution in Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable process execution telemetry from Elastic Defend and Auditd Manager on Linux to ensure the required data is available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the <code>chroot</code> execution was authorized and the target directory is an internal build root versus a host filesystem mount.</li>
<li>Monitor for follow-on shell execution, access to the container runtime socket, or kubelet credential paths, as these are common indicators of container escape attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category><category>chroot</category></item><item><title>LXD Backup Import Bypass Allows Privilege Escalation in Restricted Projects</title><link>https://feed.craftedsignal.io/briefs/2026-04-lxd-backup-bypass/</link><pubDate>Fri, 10 Apr 2026 19:24:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lxd-backup-bypass/</guid><description>A vulnerability in LXD allows an attacker with instance-creation rights in a restricted project to bypass project restrictions and escalate privileges by crafting a malicious backup archive.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in LXD (versions prior to the fixes mentioned below) that allows an attacker with limited privileges in a restricted project to bypass security restrictions and gain full control of the LXD host. The vulnerability stems from improper validation during instance backup import. Specifically, LXD validates project restrictions against the <code>backup/index.yaml</code> file within the backup archive but creates the instance from the <code>backup/container/backup.yaml</code> file. By crafting a malicious backup archive where <code>index.yaml</code> appears clean while <code>backup.yaml</code> contains configurations that violate project restrictions (e.g., <code>security.privileged=true</code>, <code>raw.lxc</code> host filesystem mounts), an attacker can create a privileged container and escape the restricted environment. This allows them to escalate privileges and potentially compromise the entire LXD host. The attacker needs <code>can_view_instances</code>, <code>can_create_instances</code>, and <code>can_operate_instances</code> permissions. This affects LXD versions up to those patched in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates a local directory structure mimicking an LXD backup archive, including <code>backup/index.yaml</code> and <code>backup/container/backup.yaml</code>.</li>
<li>The attacker crafts a <code>backup/index.yaml</code> file with configurations that satisfy project restrictions (e.g., no privileged mode, no raw.lxc).</li>
<li>The attacker crafts a malicious <code>backup/container/backup.yaml</code> file that contains configurations violating project restrictions, such as <code>security.privileged=true</code> and <code>raw.lxc</code> entries to mount the host&rsquo;s LXD Unix socket.</li>
<li>The attacker packages the crafted directory structure into a tar archive (e.g., <code>malicious-backup.tar</code>).</li>
<li>The attacker uses <code>lxc import target-lxd: malicious-backup.tar --project restricted-project</code> to import the malicious backup into the target LXD server. LXD validates against <code>index.yaml</code> at this stage.</li>
<li>LXD extracts the contents of the tar archive, including the malicious <code>backup.yaml</code>, to the storage volume. The actual instance creation uses <code>backup.yaml</code> configuration.</li>
<li>The attacker starts the newly created, privileged container using <code>lxc start target-lxd:escalated-instance --project restricted-project</code>.</li>
<li>The attacker leverages the bind-mounted LXD Unix socket from within the container to interact with the LXD API as a full administrator, allowing them to create admin certificates, access all projects, and modify any instance, leading to full host compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to completely bypass LXD project restrictions and gain full administrative control over the LXD host. This can lead to the compromise of all containers running on the host, data theft, and further malicious activities. The vulnerability affects multi-tenant environments where LXD is used to isolate different users or projects, allowing a malicious tenant to break out of their restricted environment and compromise the entire system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches provided by Canonical for LXD versions 6, 5.21, and 5.0 to remediate the vulnerability. Specifically, upgrade to LXD 6.7, LXD 5.21.4, or LXD 5.0.6.</li>
<li>Monitor LXD server logs for suspicious <code>lxc import</code> commands, especially those targeting restricted projects. While difficult to detect solely on command line arguments, anomalous import patterns could be a sign of attempted exploitation.</li>
<li>Deploy the provided Sigma rule to detect the creation of containers with <code>security.privileged</code> set to true or with <code>raw.lxc</code> configurations in restricted projects by analyzing the LXD database (if accessible).</li>
<li>As a defense-in-depth measure, consider implementing filesystem integrity monitoring on the LXD storage volumes to detect unauthorized modifications to container configurations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>lxd</category><category>privilege-escalation</category><category>container-escape</category><category>cve-2026-34178</category></item><item><title>Kata Containers CopyFile Policy Subversion via Symlinks</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kata-containers-copyfile-symlink/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kata-containers-copyfile-symlink/</guid><description>An oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.</description><content:encoded><![CDATA[<p>An oversight in the CopyFile policy within Kata Containers allows a malicious host to manipulate guest workload images. The vulnerability stems from insufficient validation within the <code>CopyFileRequest</code> policy, specifically related to symlink creation. The policy primarily checks the destination path of copied files but fails to adequately validate the target of symlinks created via the same API. This flaw was discovered by @calonso-nv and impacts environments where the <code>genpolicy</code> implementation is used to prevent host access to container images, including Confidential Containers workloads which rely on strong isolation. If the guest image is not protected from the host (e.g., when using unprotected host pull), the system is not vulnerable. The affected package is <code>go/github.com/kata-containers/kata-containers</code> versions prior to <code>0.0.0-20260422180503-1b9e49eb2763</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target file within the guest container image, such as a binary or configuration file they wish to overwrite.</li>
<li>The attacker crafts a <code>CopyFileRequest</code> to create a symbolic link within the <code>/run/kata-containers/shared/containers</code> directory.</li>
<li>The <code>path</code> parameter of the request specifies the location of the symlink within the shared directory.</li>
<li>The <code>data</code> parameter of the request specifies the target of the symbolic link, which points to the target file identified in step 1, inside the guest file system.</li>
<li>The Kata Agent processes the <code>CopyFileRequest</code>, creating the symbolic link within the shared directory, pointing to the target file inside the container image.</li>
<li>The attacker crafts a second <code>CopyFileRequest</code> to copy malicious data into the symlink created in step 5.</li>
<li>The Kata Agent writes the malicious data to the symlink, which then overwrites the original target file within the container image.</li>
<li>The attacker restarts the container or waits for the compromised binary to be executed, achieving arbitrary code execution within the guest.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to overwrite arbitrary files within container images managed by Kata Containers. This can lead to arbitrary code execution within the guest environment, data exfiltration, and privilege escalation. This is particularly critical in Confidential Containers environments where the trust model explicitly forbids host access to container images. Affected systems are those employing the upstream <code>genpolicy</code> implementation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to <code>go/github.com/kata-containers/kata-containers</code> version <code>0.0.0-20260422180503-1b9e49eb2763</code> or later to address CVE-2026-41326.</li>
<li>Monitor the creation of symbolic links within the <code>/run/kata-containers/shared/containers</code> directory, using the provided Sigma rule, as this is an unusual operation (file_event).</li>
<li>Implement strict access controls and monitoring for the Kata Agent to prevent unauthorized <code>CopyFileRequest</code> messages.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kata-containers</category><category>container-escape</category><category>symlink</category></item><item><title>Suspicious Unshare Usage for Namespace Manipulation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</guid><description>The `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.</description><content:encoded><![CDATA[<p>The <code>unshare</code> command in Linux is a utility used to create new namespaces, providing isolation for processes. While crucial for containerization and security, attackers can misuse <code>unshare</code> to escape container boundaries or escalate privileges by manipulating system namespaces. This occurs by creating namespaces that bypass established security controls. This activity is often observed when threat actors attempt to gain unauthorized access to host resources or elevate their privileges within a compromised system. The focus of this detection is on identifying unusual <code>unshare</code> executions that deviate from legitimate system management activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through exploiting a vulnerability in a containerized application.</li>
<li>The attacker executes the <code>unshare</code> command.</li>
<li><code>unshare</code> creates new namespaces, isolating the attacker&rsquo;s process from the rest of the system.</li>
<li>The attacker attempts to mount sensitive directories from the host system into the new namespace.</li>
<li>Using the newly gained access, the attacker attempts to modify system files, such as <code>/etc/passwd</code> or <code>/etc/shadow</code>, to create new privileged accounts.</li>
<li>The attacker leverages the elevated privileges to install persistent backdoors or malware on the host system.</li>
<li>The attacker attempts to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via <code>unshare</code> can lead to privilege escalation, container escape, and unauthorized access to sensitive resources on the host system. The impact includes potential data breaches, system compromise, and lateral movement within the network. While the number of victims is unknown, the widespread use of containerization technologies makes this a significant threat, particularly for organizations relying on Linux-based container environments and cloud infrastructures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Namespace Manipulation Using Unshare</code> to your SIEM to detect suspicious <code>unshare</code> command executions and tune for your environment.</li>
<li>Enable Auditbeat or Elastic Defend to collect the necessary process execution data to trigger the provided Sigma rule, as outlined in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review and tune the provided Sigma rule&rsquo;s exclusion list based on your environment&rsquo;s legitimate use cases for <code>unshare</code>, as described in the &ldquo;False positive analysis&rdquo; section.</li>
<li>Implement additional monitoring and alerting for unusual <code>unshare</code> usage patterns to enhance detection capabilities and prevent future occurrences as recommended in the &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>container-escape</category><category>linux</category></item><item><title>Suspicious Unshare Usage for Container Escape and Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unshare-container-escape/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unshare-container-escape/</guid><description>The rule identifies suspicious usage of unshare to manipulate system namespaces, which can be utilized to escalate privileges or escape container security boundaries.</description><content:encoded><![CDATA[<p>The <code>unshare</code> command in Linux is used to create new namespaces, isolating processes from the rest of the system. This isolation is crucial for containerization and security. However, attackers can exploit <code>unshare</code> to break out of containers or elevate privileges by creating namespaces that bypass security controls. This activity has been observed in containerized environments where threat actors attempt to gain unauthorized access to the host system or escalate their privileges within the container. The detection rule identifies suspicious <code>unshare</code> executions by monitoring process starts, filtering out benign parent processes, and focusing on unusual usage patterns, thus highlighting potential misuse. The rule covers activity starting from Elastic Defend for Containers version 9.3.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A containerized process is compromised, potentially through an initial exploit or misconfiguration.</li>
<li>The attacker executes the <code>unshare</code> command within the container.</li>
<li><code>unshare</code> is used to create new namespaces, isolating the attacker&rsquo;s process from the container&rsquo;s limitations.</li>
<li>The attacker manipulates these namespaces to gain access to resources outside the container.</li>
<li>The attacker attempts to escape the container by leveraging the newly created namespaces.</li>
<li>Upon successful escape, the attacker gains access to the host system.</li>
<li>The attacker escalates privileges on the host, potentially exploiting vulnerabilities or misconfigurations.</li>
<li>The attacker achieves full control over the host system, allowing for data exfiltration, system compromise, or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to container escape, allowing attackers to gain unauthorized access to the host system. This can result in privilege escalation, data exfiltration, and complete system compromise. The rule aims to detect and prevent such attacks by identifying suspicious usage of the <code>unshare</code> command, helping to maintain the integrity and security of containerized environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious <code>unshare</code> executions within containers and tune for your environment.</li>
<li>Review and whitelist legitimate uses of <code>unshare</code> by system management tools like <code>udevadm</code> and <code>systemd-udevd</code> to reduce false positives, as mentioned in the rule&rsquo;s description.</li>
<li>Implement additional monitoring and alerting for unusual <code>unshare</code> usage patterns to enhance detection capabilities and prevent future occurrences.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>container-escape</category><category>linux</category></item></channel></rss>