First published: Fri Jun 05 2020(Updated: )
An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker Desktop | <=2.2.0.5 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11492 is a vulnerability in Docker Desktop on Windows that allows a local attacker to intercept connections and impersonate privileges.
The severity of CVE-2020-11492 is high, with a severity value of 7.8.
CVE-2020-11492 occurs when a local attacker sets up a named pipe with the same name as Docker Service, allowing them to intercept connection attempts and impersonate privileges.
An attacker exploiting CVE-2020-11492 can intercept connections from Docker Service and gain unauthorized access with the privileges of Docker Service (which runs as SYSTEM).
To fix CVE-2020-11492, update Docker Desktop to version 2.2.0.6 or later, as this vulnerability is patched in version 2.2.0.6.