CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
PASSIVE
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H
AI Score
Confidence
Low
The version of Docker Desktop for Linux is prior to 4.34.2. It is therefore affected by multiple vulnerabilities.
A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2.
A remote code execution (RCE) vulnerability via crafted extension publisher-url/additional-urls could be abused by a malicious extension in Docker Desktop before 4.34.2.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
File data docker_cve-2024-8695.nasl
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
PASSIVE
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H
AI Score
Confidence
Low