Medium severity6.5NVD Advisory· Published Apr 30, 2026· Updated May 4, 2026
CVE-2026-28909
CVE-2026-28909
Description
Users who connect to malicious registries with hostnames matching the bypass patterns will have their registry credentials exposed in plaintext. This issue is fixed in container version 0.12.3.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/apple/container/security/advisories/GHSA-m5rp-xcpf-r8m7nvdVendor Advisory
News mentions
49- Microsoft Exchange, Windows 11 hacked on second day of Pwn2OwnBleepingComputer · May 15, 2026
- Windows 11 and Microsoft Edge hacked at Pwn2Own Berlin 2026BleepingComputer · May 14, 2026
- Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)Help Net Security · May 14, 2026
- Browser Run: now running on Cloudflare Containers, it’s faster and more scalableCloudflare Blog · May 13, 2026
- Fedora Hummingbird brings the container security model to a Linux host OSHelp Net Security · May 12, 2026
- 20 Leaders Who Built the CISO Era: 2 Decades of ChangeDark Reading · May 12, 2026
- Copy.Fail Linux VulnerabilitySchneier on Security · May 12, 2026
- Red Hat extends open source technology into spaceHelp Net Security · May 11, 2026
- ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and MoreThe Hacker News · May 11, 2026
- Dirty Frag: Linux kernel hit by second major security flaw in two weeksThe Record · May 11, 2026
- New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in AttacksSecurityWeek · May 11, 2026
- Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major DistributionsThe Hacker News · May 8, 2026
- After Replacing TeamPCP Malware, 'PCPJack' Steals Cloud SecretsDark Reading · May 7, 2026
- PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud SystemsThe Hacker News · May 7, 2026
- Red Hat Enterprise Linux adds post-quantum security and AI-driven automation in latest releasesHelp Net Security · May 7, 2026
- Insights into the clustering and reuse of phone numbers in scam emailsCisco Talos Intelligence · May 6, 2026
- Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCEThe Hacker News · May 5, 2026
- How the Story of a USB Penetration Test Went ViralDark Reading · May 5, 2026
- Shadow IT has given way to shadow AI. Enter AI-BOMsThe Register Security · May 4, 2026
- Shadow IT has given way to shadow AI. Enter AI-BOMsThe Register Security · May 4, 2026
- ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & MoreThe Hacker News · May 4, 2026
- Exploitation of ‘Copy Fail’ Linux Vulnerability BeginsSecurityWeek · May 4, 2026
- CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEVThe Hacker News · May 3, 2026
- Introducing Dynamic Workflows: durable execution that follows the tenantCloudflare Blog · May 1, 2026
- New infosec products of the month: April 2026Help Net Security · May 1, 2026
- Another AI-Assisted Software Scan Yields 9-Year-Old Linux BugDark Reading · Apr 30, 2026
- Great responsibility, without great powerCisco Talos Intelligence · Apr 30, 2026
- Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerabilityTenable Blog · Apr 30, 2026
- Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)Help Net Security · Apr 30, 2026
- New Linux 'Copy Fail' Vulnerability Enables Root Access on Major DistributionsThe Hacker News · Apr 30, 2026
- Linux cryptographic code flaw offers fast route to rootThe Register Security · Apr 30, 2026
- Linux cryptographic code flaw offers fast route to rootThe Register Security · Apr 30, 2026
- GitHub: Zounds, a genuinely helpful AI-assisted bug report that isn't total slop! Here, Wiz, take this wad of cashThe Register Security · Apr 29, 2026
- GitHub: Zounds, a genuinely helpful AI-assisted bug report that isn't total slop! Here, Wiz, take this wad of cashThe Register Security · Apr 29, 2026
- VECT: Ransomware by design, Wiper by accidentCheck Point Research · Apr 28, 2026
- Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering SoftwareThe Hacker News · Apr 25, 2026
- AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with itRapid7 Blog · Apr 23, 2026
- ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New StoriesThe Hacker News · Apr 23, 2026
- ZDI-26-299: Docker Desktop Enhanced Container Isolation Exposed Dangerous Function Local Privilege Escalation VulnerabilityZero Day Initiative · Apr 23, 2026
- DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'Dark Reading · Apr 22, 2026
- Cloudflare’s AI Platform: an inference layer designed for agentsCloudflare Blog · Apr 16, 2026
- ZDI-26-258: (0Day) Docker Desktop extension-manager Exposed Dangerous Function Local Privilege Escalation VulnerabilityZero Day Initiative · Apr 15, 2026
- ZDI-26-261: (0Day) Docker Desktop credentialHelper Directory Traversal Privilege Escalation VulnerabilityZero Day Initiative · Apr 15, 2026
- ZDI-26-260: (0Day) Docker Desktop System Editor Uncontrolled Search Path Element Privilege Escalation VulnerabilityZero Day Initiative · Apr 15, 2026
- ZDI-26-259: (0Day) Docker Desktop cli-plugins Incorrect Permission Assignment Local Privilege Escalation VulnerabilityZero Day Initiative · Apr 15, 2026
- Patch Tuesday - April 2026Rapid7 Blog · Apr 14, 2026
- ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution RuntimeCheck Point Research · Mar 30, 2026
- AI Threat Landscape Digest January-February 2026Check Point Research · Mar 29, 2026
- Falcon AIDR Detects Threats at the Prompt Layer in Kubernetes AI ApplicationsCrowdStrike Blog