Lucene search

K
cveDockerCVE-2024-8695
HistorySep 12, 2024 - 6:15 p.m.

CVE-2024-8695

2024-09-1218:15:11
CWE-79
CWE-94
Docker
web.nvd.nist.gov
26
remote code execution
vulnerability
docker desktop

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

7.8

Confidence

Low

EPSS

0.001

Percentile

40.4%

A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2.

Affected configurations

Nvd
Node
dockerdesktopRange<4.34.2
VendorProductVersionCPE
dockerdesktop*cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "Docker Extensions"
    ],
    "platforms": [
      "Windows",
      "MacOS",
      "Linux",
      "x86",
      "ARM"
    ],
    "product": "Docker Desktop",
    "vendor": "Docker",
    "versions": [
      {
        "lessThan": "4.34.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

7.8

Confidence

Low

EPSS

0.001

Percentile

40.4%

Related for CVE-2024-8695