First published: Wed Aug 28 2019(Updated: )
Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker | <2.1.0.1 | |
Microsoft Windows | ||
Docker Desktop Community Edition | ||
All of | ||
Docker Docker | <2.1.0.1 | |
Microsoft Windows | ||
Apache Geode | =1.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Docker Desktop Community Edition Privilege Escalation vulnerability is CVE-2019-15752.
CVE-2019-15752 has a severity score of 7.8, which is considered critical.
Local users can gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker Desktop, or wait for a system restart.
Versions before 2.1.0.1 of Docker Desktop Community Edition are affected by this privilege escalation vulnerability.
To fix this vulnerability, update Docker Desktop Community Edition to version 2.1.0.1 or later.