Lucene search

K
nvd[email protected]NVD:CVE-2024-6222
HistoryJul 09, 2024 - 6:15 p.m.

CVE-2024-6222

2024-07-0918:15:12
CWE-923
web.nvd.nist.gov
7
docker desktop
container breakout
cve-2024-6222
macos
linux
windows
docker marketplace

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

21.5%

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.

Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.

As exploitation requires โ€œAllow only extensions distributed through the Docker Marketplaceโ€ to be disabled, Docker Desktopย  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 ย additionally changes the default configuration to enable this setting by default.

Affected configurations

Nvd
Node
dockerdesktopRange<4.29.0
AND
applemacosMatch-
OR
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-
VendorProductVersionCPE
dockerdesktop*cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*
applemacos-cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
linuxlinux_kernel-cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
microsoftwindows-cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

21.5%

Related for NVD:CVE-2024-6222