CRITICAL · 9.8

CVE-2019-5021

Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015...

Vulnerability Description

Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
GliderlabsDocker-Alpine>= 3.3
AlpinelinuxAlpine Linux-
OpensuseLeap15.0
F5Big-Ip Controller1.2.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-5021?

CVE-2019-5021 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015...

How severe is CVE-2019-5021?

CVE-2019-5021 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2019-5021?

Check the references section above for vendor advisories and patch information. Affected products include: Gliderlabs Docker-Alpine, Alpinelinux Alpine Linux, Opensuse Leap, F5 Big-Ip Controller.