Proof of Concept: Manually Escaping Privileged Docker Containers Without Exploiting Vulnerabilities

This proof of concept shows how to escape privileged Docker containers without needing to exploit any vulnerabilities. This can allow malicious actors to gain a backdoor in a system. Read more about this on our Twitter thread:

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints.
To find out more about our products and services visit us at

You can also find us on Social Media: