CVE-2026-33747

Docker · BuildKit

Docker BuildKit contains a vulnerability that could affect the efficiency and repeatability of build artifacts, potentially leading to unauthorized access or build-time exploits.

Executive summary

A high-severity vulnerability in Docker BuildKit could allow attackers to compromise the container build process, potentially leading to the injection of malicious code or unauthorized data access.

Vulnerability

BuildKit is a critical component for converting source code into build artifacts. The vulnerability likely involves improper handling of build instructions or environment isolation, which could allow an attacker with control over the build configuration to execute unauthorized actions or access sensitive information from the host or other build stages.

Business impact

With a CVSS score of 8.4, this vulnerability represents a High-severity risk to the software supply chain. Successful exploitation could result in "poisoned" container images being deployed into production, leading to widespread compromise. Additionally, it could allow for the theft of build secrets, such as API keys or credentials, stored within the build environment.

Remediation

Immediate Action: Update Docker and BuildKit to the latest versions immediately to incorporate the necessary security fixes for the build engine.

Proactive Monitoring: Audit build logs for unusual activity, such as unexpected network connections during the build phase or modifications to sensitive system files within the build container.

Compensating Controls: Implement build-time security scanning and use "rootless" mode for Docker builds to limit the potential impact of a build-stage escape or compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Securing the build pipeline is essential for modern software development. Organizations should treat this BuildKit update as a critical priority to ensure that container images remain untainted and that the build environment remains isolated from potential attackers.