ID |
CVE-2024-6222
|
Sažetak |
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.
Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.
As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default. |
Reference |
|
CVSS |
Base: | 7.0 |
Impact: | 5.9 |
Exploitability: | 1.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
LOCAL |
HIGH |
LOW |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Zadnje važnije ažuriranje |
12-07-2024 - 17:05 |
Objavljeno |
09-07-2024 - 18:15 |