A newly discovered Docker vulnerability allows attackers to exploit a loophole in the authorization plugin system, bypassing security controls and threatening host systems. Immediate patching is urged for all affected environments.
#Docker Vulnerability | #Authorization Plugin | #Cybersecurity Risks