Since Docker’s release in 2013, several vulnerabilities have been discovered that could lead to privilege escalation and arbitrary code execution. In our Docker Security and Containerization Report, we review and highlight the top 5 vulnerabilities from high to critical severity.  

Container Security and Risks

Based on interviews with developers who use Docker in their software deployment process, and the vulnerabilities discussed in our Docker security  report (bypasses, privilege escalation, denial of service, and code execution),  summarized below are the top 5 risks inherent across container deployment and maintenance in an organization’s IT environment.


By default, in some versions of Docker, all network traffic is allowed between containers on the same host. This increases the risk of unintended and unwanted disclosure of information to other containers. Developers should only allow intercommunication that is necessary by linking specific containers. This will significantly reduce attack (Read more...)