First published: Thu Apr 06 2023(Updated: )
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
Credit: security@docker.com
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop | =4.17.0 | |
Docker Desktop | =4.17.1 |
Update Docker Desktop to version 4.18.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-1802.
The title of the vulnerability is 'In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over…'
The severity of CVE-2023-1802 is high with a CVSS score of 7.5.
The vulnerability in Docker Desktop 4.17.x occurs when the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed.
Only users who have Access Experimental Features enabled and have Docker Desktop versions 4.17.0 and 4.17.1 installed on Windows are affected by this vulnerability.
A targeted network sniffing attack can exploit this vulnerability in Docker Desktop 4.17.x and lead to a disclosure of sensitive information, as the registry credentials are sent over plain HTTP.
Yes, Docker Desktop users should update to a version higher than 4.17.1 to fix this vulnerability.
You can find more information about CVE-2023-1802 in the release notes of Docker Desktop 4.17.0 and the corresponding GitHub issue.
The Common Weakness Enumeration (CWE) ID associated with this vulnerability is CWE-319.