<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-44849 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44849/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 16:37:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44849/feed.xml" rel="self" type="application/rss+xml"/><item><title>Portainer Endpoint Security Bypass via Docker Swarm Service API</title><link>https://feed.craftedsignal.io/briefs/2026-05-portainer-swarm-bypass/</link><pubDate>Thu, 14 May 2026 16:37:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-portainer-swarm-bypass/</guid><description>Portainer is vulnerable to an endpoint security bypass via Swarm service create/update, enabling non-admin users with access to a Docker Swarm endpoint to bypass `EndpointSecuritySettings` restrictions and gain elevated privileges such as configuring services with elevated Linux capabilities, disabling syscall filtering and AppArmor confinement, setting arbitrary sysctl values, and mounting arbitrary host paths.</description><content:encoded><![CDATA[<p>Portainer enforces <code>EndpointSecuritySettings</code> restrictions to limit container configurations for non-admin users. However, these restrictions are not fully applied when creating or updating Docker Swarm services through the Portainer API. A non-admin user with access to a Docker Swarm endpoint can bypass these security measures by using the <code>POST /services/create</code> or <code>POST /services/{id}/update</code> endpoints. This bypass allows the user to escalate privileges, gaining capabilities such as mounting arbitrary host paths, elevating Linux capabilities (e.g., <code>CAP_SYS_ADMIN</code>), disabling syscall filtering, and disabling AppArmor confinement. The vulnerability affects all Portainer releases with Docker Swarm support prior to versions 2.33.8, 2.39.2, and 2.41.0, undermining the administrator&rsquo;s security policy on Swarm-enabled endpoints. The volume driver local-bind variant was disclosed on 2026-03-12, and the Swarm service create/update bypass was disclosed on 2026-04-05.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated, non-admin user gains access to a Docker Swarm endpoint via Portainer RBAC.</li>
<li>The user crafts a <code>POST /services/create</code> request to create a new service, bypassing capability, sysctl, and security-opt checks.</li>
<li>Alternatively, the user creates a benign service and then sends a <code>POST /services/{id}/update</code> request to modify the service, bypassing all security checks.</li>
<li>The request includes configurations to elevate Linux capabilities (e.g., <code>CapabilityAdd: [&quot;ALL&quot;]</code>), disable syscall filtering (<code>Privileges.Seccomp.Mode: &quot;unconfined&quot;</code>), or disable AppArmor confinement (<code>Privileges.AppArmor.Mode: &quot;disabled&quot;</code>).</li>
<li>The request may also include configurations for arbitrary sysctl values inside the container namespace, and/or bind mounts of any host path, including sensitive paths such as <code>/</code>, <code>/var/run/docker.sock</code>, or SSH keys.</li>
<li>The Docker daemon creates or updates the service with the elevated privileges, bypassing Portainer&rsquo;s intended security restrictions.</li>
<li>The attacker can then leverage the elevated privileges to access the host filesystem (e.g., via <code>chroot /host</code>) or perform other actions with root-equivalent access on the Swarm manager host.</li>
<li>The final objective is to gain unauthorized access to sensitive data or systems, or to disrupt services running on the Docker Swarm cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a non-admin Portainer user to escalate privileges and gain root-equivalent access on the Swarm manager host. This bypasses the administrator&rsquo;s security policy and enables the attacker to perform actions such as accessing sensitive data, modifying system configurations, or disrupting services. The impact is significant because it undermines the security model of Portainer and Docker Swarm, potentially leading to unauthorized access to critical infrastructure and data. The vulnerability affects every Portainer release with Docker Swarm support prior to versions 2.33.8, 2.39.2, and 2.41.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Portainer to versions 2.33.8, 2.39.2, or 2.41.0 to remediate CVE-2026-44849.</li>
<li>Until an upgrade can be performed, temporarily revoke Swarm endpoint access for non-admin users via Portainer RBAC, as described in the advisory.</li>
<li>Implement a daemon-side allowlist to block the creation of local-driver volumes that use <code>type: none</code> / <code>o: bind</code> on untrusted endpoints, mitigating the volume-driver-bind variant of the vulnerability.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect exploitation attempts targeting the Portainer API.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>portainer</category><category>docker</category><category>swarm</category><category>privilege-escalation</category><category>vulnerability</category><category>CVE-2026-44849</category></item></channel></rss>