Impact
The vulnerability arises when CrewAI fails to verify that the Docker daemon remains active during runtime. When Docker is stopped, the application falls back to a permissive sandbox configuration that permits an attacker to execute arbitrary code. This oversight allows remote attackers to gain full control over the host system through the insecure sandbox, leading to complete compromise of confidentiality, integrity, and availability.
Affected Systems
CrewAI is the affected product. No specific version details are provided by the CNA, so any deployment using CrewAI could be susceptible until an official fix is released.
Risk and Exploitability
The flaw permits total system takeover if an attacker can reach the sandbox. While EPSS data is unavailable and the vulnerability is not listed in CISA KEV, the potential for RCE makes the risk high. The likely attack vector is remote, exploiting the unsecured sandbox configuration when Docker is inactive. Administrators should treat this as a critical issue and apply a patch as soon as possible.
OpenCVE Enrichment