Lucene search

K
vulnrichmentDockerVULNRICHMENT:CVE-2024-6222
HistoryJul 09, 2024 - 5:16 p.m.

CVE-2024-6222 In Docker Desktop before v4.29.0 an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages

2024-07-0917:16:05
CWE-923
Docker
github.com
5
container breakout
docker desktop vm
security vulnerability
docker marketplace
ipc messages

CVSS4

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

PASSIVE

CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

21.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.

Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.

As exploitation requires โ€œAllow only extensions distributed through the Docker Marketplaceโ€ to be disabled, Docker Desktopย  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 ย additionally changes the default configuration to enable this setting by default.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*"
    ],
    "vendor": "docker",
    "product": "desktop",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "4.29.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

PASSIVE

CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

21.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-6222