First published: Wed Mar 18 2020(Updated: )
Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Desktop for Windows Stable before 2.2.0.4, and Docker Desktop for Windows Edge before 2.2.2.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop | <2.1.0.9 | |
Docker Desktop | <2.2.0.4 | |
Docker Desktop | <2.2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10665 refers to a vulnerability in Docker Desktop that allows local privilege escalation to NT AUTHORITY\SYSTEM.
CVE-2020-10665 works by mishandling the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes.
Docker Desktop Enterprise before 2.1.0.9, Docker Desktop Windows before 2.2.0.4, and Docker Desktop Edge before 2.2.2.0 are affected by CVE-2020-10665.
CVE-2020-10665 has a severity rating of high with a CVSS score of 6.7.
To fix the CVE-2020-10665 vulnerability, update Docker Desktop to version 2.1.0.9 for Docker Desktop Enterprise, 2.2.0.4 for Docker Desktop Windows, or 2.2.2.0 for Docker Desktop Edge.