Metrics
Affected Vendors & Products
Fri, 30 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amazon:firecracker:*:*:*:*:*:*:*:* cpe:2.3:a:amazon:firecracker:1.14.0:-:*:*:*:*:*:* cpe:2.3:a:amazon:firecracker:1.14.0:dev:*:*:*:*:*:* |
Tue, 27 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon firecracker |
|
| Vendors & Products |
Amazon
Amazon firecracker |
Fri, 23 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 23 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above. | |
| Title | Arbitrary Host File Overwrite via Symlink in Firecracker Jailer | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published: 2026-01-23T20:25:02.188Z
Updated: 2026-01-23T20:38:50.592Z
Reserved: 2026-01-23T20:11:49.349Z
Link: CVE-2026-1386
Updated: 2026-01-23T20:33:10.577Z
Status : Analyzed
Published: 2026-01-23T21:15:51.397
Modified: 2026-01-30T16:57:56.657
Link: CVE-2026-1386
ReportizFlow