CVE-2024-6222

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://docs.docker.com/desktop/release-notes/#4290 - Release Notes () https://docs.docker.com/desktop/release-notes/#4290 - Release Notes

12 Jul 2024, 17:05

Type Values Removed Values Added
First Time Docker
Apple
Linux
Apple macos
Linux linux Kernel
Docker desktop
Microsoft
Microsoft windows
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
References () https://docs.docker.com/desktop/release-notes/#4290 - () https://docs.docker.com/desktop/release-notes/#4290 - Release Notes
Summary
  • (es) En Docker Desktop anterior a v4.29.0, un atacante que obtuvo acceso a la máquina virtual de Docker Desktop a través de una ruptura del contenedor puede escapar al host pasando extensiones y mensajes IPC relacionados con el panel. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 soluciona el problema en MacOS, Linux y Windows con backend Hyper-V. Como la explotación requiere que se deshabilite "Allow only extensions distributed through the Docker Marketplace", Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 cambia adicionalmente la configuración predeterminada para habilitar esta configuración al por defecto.
CPE cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*

09 Jul 2024, 18:18

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-09 18:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6222

Mitre link : CVE-2024-6222

CVE.ORG link : CVE-2024-6222


JSON object : View

Products Affected

docker

  • desktop

apple

  • macos

linux

  • linux_kernel

microsoft

  • windows
CWE
CWE-923

Improper Restriction of Communication Channel to Intended Endpoints

NVD-CWE-noinfo