First published: Mon Sep 10 2018(Updated: )
An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mobyproject Moby | <17.06.0 | |
go/github.com/docker/docker | <17.06.0-ce | 17.06.0-ce |
redhat/moby | <17.06.0 | 17.06.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-12608.
The severity of CVE-2018-12608 is high, with a severity value of 7.5.
The affected software for CVE-2018-12608 is Mobyproject Moby version up to but not including 17.06.0.
CVE-2018-12608 impacts Docker by allowing a client with any domain validated certificate signed by a system-trusted root CA to have access.
Yes, there is a fix available for CVE-2018-12608. Please refer to the reference link for more information.