All the vulnerabilites related to Docker Inc. - Docker Desktop
cve-2023-0627
Vulnerability from cvelistv5
Published
2023-09-25 15:31
Modified
2024-09-24 15:37
Severity ?
EPSS score ?
Summary
Docker Desktop 4.11.x allows --no-windows-containers flag bypass
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4120 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 4.11.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.133Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0627", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:37:26.565896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:37:48.589Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "x86" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "status": "affected", "version": "4.11.x" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Docker Desktop installed with the\u0026nbsp;\u003cspan style=\"background-color: rgb(239, 250, 102);\"\u003e--no-widnows-containers\u003c/span\u003e flag" } ], "value": "Docker Desktop installed with the\u00a0--no-widnows-containers flag" } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Cure53" } ], "datePublic": "2022-09-01T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Docker Desktop 4.11.x allows \u003cspan style=\"background-color: rgb(239, 250, 102);\"\u003e--no-windows-containers\u003c/span\u003e flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).\u003cp\u003eThis issue affects Docker Desktop: 4.11.X.\u003c/p\u003e" } ], "value": "Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).This issue affects Docker Desktop: 4.11.X.\n\n" } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-501", "description": "CWE-501: Trust Boundary Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T15:31:58.782Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to 4.12.0" } ], "value": "Update to 4.12.0" } ], "source": { "discovery": "EXTERNAL" }, "title": "Docker Desktop 4.11.x allows --no-windows-containers flag bypass", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-0627", "datePublished": "2023-09-25T15:31:58.782Z", "dateReserved": "2023-02-01T22:31:05.774Z", "dateUpdated": "2024-09-24T15:37:48.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6222
Vulnerability from cvelistv5
Published
2024-07-09 17:16
Modified
2024-08-01 21:33
Severity ?
EPSS score ?
Summary
In Docker Desktop before v4.29.0 an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4290 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "desktop", "vendor": "docker", "versions": [ { "lessThan": "4.29.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6222", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T03:55:55.155Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:33:05.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4290" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "v4.29.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Docker Extensions enabled" } ], "value": "Docker Extensions enabled" }, { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\"Allow only extensions distributed through the Docker Marketplace\" disabled\u003cbr\u003e" } ], "value": "\"Allow only extensions distributed through the Docker Marketplace\" disabled" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Billy Jheng Bing-Jhong" }, { "lang": "en", "type": "finder", "value": "\u0110\u1ed7 Minh Tu\u1ea5n" }, { "lang": "en", "type": "finder", "value": "Muhammad Alifa Ramdhan" }, { "lang": "en", "type": "coordinator", "value": "Trend Micro Zero Day Initiative" } ], "datePublic": "2024-06-21T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.\u003cbr\u003e\u003cbr\u003eDocker Desktop \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.docker.com/desktop/release-notes/#4290\"\u003ev4.29.0\u003c/a\u003e fixes the issue on MacOS, Linux and Windows with Hyper-V backend.\u003cbr\u003e\u003cbr\u003eAs exploitation requires \"Allow only extensions distributed through the Docker Marketplace\" to be disabled, Docker Desktop\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.docker.com/desktop/release-notes/#4310\"\u003ev4.31.0\u003c/a\u003e\u0026nbsp;additionally changes the default configuration to enable this setting by default.\u003cbr\u003e" } ], "value": "In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.\n\nDocker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.\n\nAs exploitation requires \"Allow only extensions distributed through the Docker Marketplace\" to be disabled, Docker Desktop\u00a0 v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 \u00a0additionally changes the default configuration to enable this setting by default." } ], "impacts": [ { "capecId": "CAPEC-480", "descriptions": [ { "lang": "en", "value": "CAPEC-480 Escaping Virtualization" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 7.3, "baseSeverity": "HIGH", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-923", "description": "CWE-923: Improper Restriction of Communication Channel to Intended Endpoints", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T17:16:05.646Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4290" } ], "source": { "discovery": "EXTERNAL" }, "title": "In Docker Desktop before v4.29.0 an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Disable Docker Extensions or enable \"Allow only extensions distributed through the Docker Marketplace\" from the Settings panel." } ], "value": "Disable Docker Extensions or enable \"Allow only extensions distributed through the Docker Marketplace\" from the Settings panel." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2024-6222", "datePublished": "2024-07-09T17:16:05.646Z", "dateReserved": "2024-06-20T18:47:44.854Z", "dateUpdated": "2024-08-01T21:33:05.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0626
Vulnerability from cvelistv5
Published
2023-09-25 15:31
Modified
2024-09-24 15:38
Severity ?
EPSS score ?
Summary
Docker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4120 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0626", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:38:25.790536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:38:38.480Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "x86", "ARM" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "4.12.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Masato Kinugawa" }, { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Mohan Pedhapati" } ], "datePublic": "2022-09-01T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eDocker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route.\u003cbr\u003e\u003cbr\u003eThis issue affects Docker Desktop: before 4.12.0.\u003c/p\u003e" } ], "value": "Docker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route.\n\nThis issue affects Docker Desktop: before 4.12.0.\n\n" } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T15:31:38.283Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to 4.12.0" } ], "value": "Update to 4.12.0" } ], "source": { "discovery": "EXTERNAL" }, "title": "Docker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route ", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Disable extensions" } ], "value": "Disable extensions" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-0626", "datePublished": "2023-09-25T15:31:38.283Z", "dateReserved": "2023-02-01T22:31:04.271Z", "dateUpdated": "2024-09-24T15:38:38.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0625
Vulnerability from cvelistv5
Published
2023-09-25 15:31
Modified
2024-09-24 15:39
Severity ?
EPSS score ?
Summary
Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4120 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0625", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:39:03.026730Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:39:13.171Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "x86", "ARM" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "4.12.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Masato Kinugawa" } ], "datePublic": "2022-09-01T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eDocker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog.\u003cbr\u003e\u003cbr\u003eThis issue affects Docker Desktop: before 4.12.0.\u003c/p\u003e" } ], "value": "Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog.\n\nThis issue affects Docker Desktop: before 4.12.0.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] }, { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-829", "description": "CWE-829 Inclusion of Functionality from Untrusted Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T15:31:09.114Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to 4.12.0" } ], "value": "Update to 4.12.0" } ], "source": { "discovery": "EXTERNAL" }, "title": "Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Disable extensions" } ], "value": "Disable extensions" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-0625", "datePublished": "2023-09-25T15:31:09.114Z", "dateReserved": "2023-02-01T22:31:03.132Z", "dateUpdated": "2024-09-24T15:39:13.171Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5165
Vulnerability from cvelistv5
Published
2023-09-25 15:29
Modified
2024-09-24 15:55
Severity ?
EPSS score ?
Summary
Docker Desktop before 4.23.0 allows Enhanced Container Isolation bypass via debug shell
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4230 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 4.13.0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:07.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4230" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5165", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:55:31.117566Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:55:38.645Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "x86", "ARM" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "4.23.0", "status": "affected", "version": "4.13.0", "versionType": "semver" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Enhanced Container Isolation enabled (only available for Docker Business users)" } ], "value": "Enhanced Container Isolation enabled (only available for Docker Business users)" } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "L. Kofler" } ], "datePublic": "2023-09-11T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDocker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. \u003cbr\u003e\u003cbr\u003eThis issue has been fixed in Docker Desktop 4.23.0. \u003cbr\u003e\u003cbr\u003eAffected Docker Desktop versions: from 4.13.0 before 4.23.0.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. \n\nThis issue has been fixed in Docker Desktop 4.23.0. \n\nAffected Docker Desktop versions: from 4.13.0 before 4.23.0.\n" } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-424", "description": "CWE-424: Improper Protection of Alternate Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T15:29:12.869Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4230" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to version 4.23.0" } ], "value": "Update to version 4.23.0" } ], "source": { "discovery": "EXTERNAL" }, "title": "Docker Desktop before 4.23.0 allows Enhanced Container Isolation bypass via debug shell", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-5165", "datePublished": "2023-09-25T15:29:12.869Z", "dateReserved": "2023-09-25T14:05:45.905Z", "dateUpdated": "2024-09-24T15:55:38.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0629
Vulnerability from cvelistv5
Published
2023-03-13 11:16
Modified
2024-08-02 05:17
Severity ?
EPSS score ?
Summary
Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation restrictions via the raw Docker socket and launch privileged containers
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4170 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 4.13.0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4170" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Settings Management", "Enhanced Container Isolation" ], "platforms": [ "MacOS", "Windows (Hyper-V)", "Linux" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "4.17.0", "status": "affected", "version": "4.13.0", "versionType": "semver" } ] } ], "datePublic": "2023-03-13T11:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to \u003ctt\u003edocker.raw.sock\u003c/tt\u003e, or \u003ctt\u003enpipe:////.pipe/docker_engine_linux\u003c/tt\u003e on Windows, via the \u003ctt\u003e-H\u003c/tt\u003e (\u003ctt\u003e--host\u003c/tt\u003e) CLI flag or the \u003ctt\u003eDOCKER_HOST\u003c/tt\u003e environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker\u0027s raw socket).\u003cbr\u003e\u003cbr\u003eThe affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.\u003cbr\u003e\u003cp\u003eThis issue has been fixed in Docker Desktop 4.17.0. \u003cbr\u003e\u003cbr\u003eAffected Docker Desktop versions: from 4.13.0 before 4.17.0.\u003c/p\u003e" } ], "value": "Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to docker.raw.sock, or npipe:////.pipe/docker_engine_linux on Windows, via the -H (--host) CLI flag or the DOCKER_HOST environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker\u0027s raw socket).\n\nThe affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.\nThis issue has been fixed in Docker Desktop 4.17.0. \n\nAffected Docker Desktop versions: from 4.13.0 before 4.17.0.\n\n" } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-424", "description": "CWE-424: Improper Protection of Alternate Path", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-501", "description": "CWE-501: Trust Boundary Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-13T11:16:41.171Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4170" } ], "source": { "discovery": "INTERNAL" }, "title": "Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation restrictions via the raw Docker socket and launch privileged containers", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-0629", "datePublished": "2023-03-13T11:16:41.171Z", "dateReserved": "2023-02-01T22:40:41.487Z", "dateUpdated": "2024-08-02T05:17:50.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0633
Vulnerability from cvelistv5
Published
2023-09-25 15:32
Modified
2024-09-24 14:59
Severity ?
EPSS score ?
Summary
In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in LPE
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4120 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0633", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:59:08.624405Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:59:18.568Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "x86" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "4.12.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Cure53" } ], "datePublic": "2022-09-01T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in local privilege escalation (LPE).\u003cp\u003eThis issue affects Docker Desktop: before 4.12.0.\u003c/p\u003e" } ], "value": "In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in local privilege escalation (LPE).This issue affects Docker Desktop: before 4.12.0.\n\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T15:32:20.271Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4120" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to 4.12.0" } ], "value": "Update to 4.12.0" } ], "source": { "discovery": "EXTERNAL" }, "title": "In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in LPE", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-0633", "datePublished": "2023-09-25T15:32:20.271Z", "dateReserved": "2023-02-01T23:30:55.499Z", "dateUpdated": "2024-09-24T14:59:18.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5166
Vulnerability from cvelistv5
Published
2023-09-25 15:30
Modified
2024-09-24 15:54
Severity ?
EPSS score ?
Summary
Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4230 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:07.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4230" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5166", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:53:56.675460Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:54:17.938Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "x86", "ARM" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "4.23.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "M. Haunschmid" } ], "datePublic": "2023-09-11T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eDocker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL.\u003cbr\u003e\u003cbr\u003eThis issue affects Docker Desktop: before 4.23.0.\u003c/p\u003e" } ], "value": "Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL.\n\nThis issue affects Docker Desktop: before 4.23.0.\n\n" } ], "impacts": [ { "capecId": "CAPEC-555", "descriptions": [ { "lang": "en", "value": "CAPEC-555 Remote Services with Stolen Credentials" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T15:30:10.164Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4230" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update Docker Desktop to 4.23.0" } ], "value": "Update Docker Desktop to 4.23.0" } ], "source": { "discovery": "EXTERNAL" }, "title": "Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Disable extensions" } ], "value": "Disable extensions" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-5166", "datePublished": "2023-09-25T15:30:10.164Z", "dateReserved": "2023-09-25T14:05:47.327Z", "dateUpdated": "2024-09-24T15:54:17.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0628
Vulnerability from cvelistv5
Published
2023-03-13 11:16
Modified
2024-08-02 05:17
Severity ?
EPSS score ?
Summary
Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking a user to open a crafted malicious docker-desktop:// URL
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4170 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4170" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Dev Environments" ], "platforms": [ "Windows", "MacOS", "Linux" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "4.17.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "@suanve" } ], "datePublic": "2023-03-13T11:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking a user to open a crafted malicious \u003ctt\u003edocker-desktop://\u003c/tt\u003e URL." } ], "value": "Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking a user to open a crafted malicious docker-desktop:// URL." } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-13T12:52:38.039Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4170" } ], "source": { "discovery": "EXTERNAL" }, "title": "Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking a user to open a crafted malicious docker-desktop:// URL", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2023-0628", "datePublished": "2023-03-13T11:16:30.426Z", "dateReserved": "2023-02-01T22:39:05.609Z", "dateUpdated": "2024-08-02T05:17:50.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5652
Vulnerability from cvelistv5
Published
2024-07-09 17:07
Modified
2024-08-01 21:18
Severity ?
EPSS score ?
Summary
In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode
References
▼ | URL | Tags |
---|---|---|
https://docs.docker.com/desktop/release-notes/#4310 | release-notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Docker Inc. | Docker Desktop |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5652", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-23T18:59:59.468065Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T19:00:12.500Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:18:06.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://docs.docker.com/desktop/release-notes/#4310" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Docker Desktop", "vendor": "Docker Inc.", "versions": [ { "lessThan": "v4.31.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Docker Desktop not installed with the --no-windows-containers installer flag\u003cbr\u003e" } ], "value": "Docker Desktop not installed with the --no-windows-containers installer flag" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Hashim Jawad ( @ihack4falafel)" }, { "lang": "en", "type": "finder", "value": "Trend Micro Zero Day Initiative" } ], "datePublic": "2024-06-06T15:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Docker Desktop on Windows before v4.31.0\u0026nbsp;allows a user in the \u003ccode\u003edocker-users\u003c/code\u003e\u0026nbsp;group to cause a Windows Denial-of-Service through the \u003ccode\u003eexec-path\u003c/code\u003e\u0026nbsp;Docker daemon config option in Windows containers mode.\u003cbr\u003e" } ], "value": "In Docker Desktop on Windows before v4.31.0\u00a0allows a user in the docker-users\u00a0group to cause a Windows Denial-of-Service through the exec-path\u00a0Docker daemon config option in Windows containers mode." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T17:07:08.691Z", "orgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "shortName": "Docker" }, "references": [ { "tags": [ "release-notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4310" } ], "source": { "discovery": "UNKNOWN" }, "title": "In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users\u00a0group to cause a Windows Denial-of-Service through the exec-path\u00a0Docker daemon config option in Windows containers mode", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "686469e6-3ff6-451b-ab8b-cf5b9e89401e", "assignerShortName": "Docker", "cveId": "CVE-2024-5652", "datePublished": "2024-07-09T17:07:08.691Z", "dateReserved": "2024-06-05T10:54:16.890Z", "dateUpdated": "2024-08-01T21:18:06.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }