rkt is vulnerable to privilege escalation. An attacker with superuser previlage can exploit vulnerabilties in order to compromise a host when a user enters the kt rkt enter ’command (equivalent to the‘ docker exec ’command) via a module under its control accessing the containers.