The vulnerability is triggered when a cloud container pulls a malicious image from a registry.
Source: Threadpost