Vulnerability Description
Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docker | Registry | 2.5 |
Related Weaknesses (CWE)
References
- https://github.com/docker/distribution-library-imageProduct
- https://github.com/donghyunlee00/CVE/blob/main/CVE-2020-29591Third Party Advisory
- https://hub.docker.com/_/registryProduct
- https://github.com/docker/distribution-library-imageProduct
- https://github.com/donghyunlee00/CVE/blob/main/CVE-2020-29591Third Party Advisory
- https://hub.docker.com/_/registryProduct
FAQ
What is CVE-2020-29591?
CVE-2020-29591 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker...
How severe is CVE-2020-29591?
CVE-2020-29591 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-29591?
Check the references section above for vendor advisories and patch information. Affected products include: Docker Registry.