CVE-2020-11492

An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:docker:docker_desktop:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () https://docs.docker.com/docker-for-windows/release-notes/ - Release Notes, Vendor Advisory () https://docs.docker.com/docker-for-windows/release-notes/ - Release Notes, Vendor Advisory
References () https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/ - Third Party Advisory () https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/ - Third Party Advisory

Information

Published : 2020-06-05 14:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11492

Mitre link : CVE-2020-11492

CVE.ORG link : CVE-2020-11492


JSON object : View

Products Affected

microsoft

  • windows

docker

  • docker_desktop
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')