First published: Mon Sep 25 2023(Updated: )
Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. This issue has been fixed in Docker Desktop 4.23.0. Affected Docker Desktop versions: from 4.13.0 before 4.23.0.
Credit: security@docker.com security@docker.com
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker Desktop | >=4.13.0<4.23.0 | |
>=4.13.0<4.23.0 |
Update to version 4.23.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5165 is a vulnerability in Docker Desktop before 4.23.0 that allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions.
An unprivileged user can bypass Enhanced Container Isolation (ECI) in Docker Desktop before 4.23.0 by accessing the debug shell, which remains accessible for a short time window after launching Docker Desktop.
CVE-2023-5165 affects Docker Desktop users before version 4.23.0.
CVE-2023-5165 has a severity rating of 8.8 (high).
To fix CVE-2023-5165, users should update Docker Desktop to version 4.23.0 or later.