{"api_version":"1","generated_at":"2026-04-23T05:07:10+00:00","cve":"CVE-2021-41092","urls":{"html":"https://cve.report/CVE-2021-41092","api":"https://cve.report/api/cve/CVE-2021-41092.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-41092","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-41092"},"summary":{"title":"CVE-2021-41092","description":"Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-10-04 20:15:00","updated_at":"2023-11-07 03:38:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v","name":"https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v","refsource":"CONFIRM","tags":[],"title":"Docker CLI leaks private registry credentials to registry-1.docker.io · Advisory · docker/cli · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/","name":"FEDORA-2021-df975338d4","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: moby-engine-20.10.9-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/","name":"FEDORA-2021-df975338d4","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: moby-engine-20.10.9-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/","name":"FEDORA-2021-b5a9a481a2","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: moby-engine-20.10.9-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/","name":"FEDORA-2021-b5a9a481a2","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: moby-engine-20.10.9-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b","name":"https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b","refsource":"MISC","tags":[],"title":"Merge pull request #2 from moby/cli-ghsa-99pg-grm5-qq3v-default-authc… · docker/cli@893e52c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-41092","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41092","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"41092","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"docker","cpe5":"command_line_interface","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"41092","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"41092","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-41092","qid":"179499","title":"Debian Security Update for docker.io (CVE-2021-41092)"},{"cve":"CVE-2021-41092","qid":"198560","title":"Ubuntu Security Notification for Docker Vulnerability (USN-5134-1)"},{"cve":"CVE-2021-41092","qid":"281996","title":"Fedora Security Update for containerd (FEDORA-2021-df975338d4)"},{"cve":"CVE-2021-41092","qid":"352849","title":"Amazon Linux Security Advisory for docker: ALAS-2021-1537"},{"cve":"CVE-2021-41092","qid":"353186","title":"Amazon Linux Security Advisory for docker : ALAS2NITRO-ENCLAVES-2022-017"},{"cve":"CVE-2021-41092","qid":"353191","title":"Amazon Linux Security Advisory for docker : ALAS2DOCKER-2022-017"},{"cve":"CVE-2021-41092","qid":"356876","title":"Amazon Linux Security Advisory for docker : ALAS2ECS-2023-028"},{"cve":"CVE-2021-41092","qid":"501837","title":"Alpine Linux Security Update for docker"},{"cve":"CVE-2021-41092","qid":"504679","title":"Alpine Linux Security Update for docker"},{"cve":"CVE-2021-41092","qid":"590976","title":"Siemens SCALANCE LPE9403 Third-Party Multiple Vulnerabilities (ICSA-22-167-09) (SSA-222547)"},{"cve":"CVE-2021-41092","qid":"6140407","title":"AWS Bottlerocket Security Update for docker-cli (GHSA-vp43-f3pm-7jvp)"},{"cve":"CVE-2021-41092","qid":"672019","title":"EulerOS Security Update for docker-engine (EulerOS-SA-2022-2253)"},{"cve":"CVE-2021-41092","qid":"672023","title":"EulerOS Security Update for docker (EulerOS-SA-2022-2265)"},{"cve":"CVE-2021-41092","qid":"672049","title":"EulerOS Security Update for docker-engine (EulerOS-SA-2022-2240)"},{"cve":"CVE-2021-41092","qid":"672074","title":"EulerOS Security Update for docker-engine (EulerOS-SA-2022-2218)"},{"cve":"CVE-2021-41092","qid":"672110","title":"EulerOS Security Update for docker-engine (EulerOS-SA-2022-2311)"},{"cve":"CVE-2021-41092","qid":"751272","title":"SUSE Enterprise Linux Security Update for containerd, docker, runc (SUSE-SU-2021:3506-1)"},{"cve":"CVE-2021-41092","qid":"751273","title":"OpenSUSE Security Update for containerd, docker, runc (openSUSE-SU-2021:3506-1)"},{"cve":"CVE-2021-41092","qid":"751303","title":"OpenSUSE Security Update for containerd, docker, runc (openSUSE-SU-2021:1404-1)"},{"cve":"CVE-2021-41092","qid":"751692","title":"OpenSUSE Security Update for containerd, docker (openSUSE-SU-2022:0334-1)"},{"cve":"CVE-2021-41092","qid":"753284","title":"SUSE Enterprise Linux Security Update for containerd, docker (SUSE-SU-2022:0334-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-41092","STATE":"PUBLIC","TITLE":"Docker CLI leaks private registry credentials to registry-1.docker.io"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"cli","version":{"version_data":[{"version_value":"< 20.10.9"}]}}]},"vendor_name":"docker"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"}]}]},"references":{"reference_data":[{"name":"https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v","refsource":"CONFIRM","url":"https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v"},{"name":"https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b","refsource":"MISC","url":"https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b"},{"refsource":"FEDORA","name":"FEDORA-2021-df975338d4","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/"},{"refsource":"FEDORA","name":"FEDORA-2021-b5a9a481a2","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf"}]},"source":{"advisory":"GHSA-99pg-grm5-qq3v","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-10-04 20:15:00","lastModifiedDate":"2023-11-07 03:38:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:docker:command_line_interface:*:*:*:*:*:*:*:*","versionEndExcluding":"20.10.9","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"41092","Ordinal":"216953","Title":"CVE-2021-41092","CVE":"CVE-2021-41092","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"41092","Ordinal":"1","NoteData":"Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"41092","Ordinal":"2","NoteData":"2021-10-04","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"41092","Ordinal":"3","NoteData":"2021-10-29","Type":"Other","Title":"Modified"}]}}}