7.3
CWE
923
EPSS
0.043%
Advisory Published
Updated

CVE-2024-6222: In Docker Desktop before v4.29.0 an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages

First published: Tue Jul 09 2024(Updated: )

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.

Credit: security@docker.com

Affected SoftwareAffected VersionHow to fix
All of
Docker<4.29.0
Any of
macOS
Linux Kernel
Microsoft Windows Operating System

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-6222?

    CVE-2024-6222 is considered a high-severity vulnerability due to the potential for an attacker to escape from a container to the host system.

  • How do I fix CVE-2024-6222?

    To mitigate CVE-2024-6222, upgrade Docker Desktop to version 4.29.0 or later.

  • What systems are affected by CVE-2024-6222?

    CVE-2024-6222 affects Docker Desktop versions prior to 4.29.0.

  • Can CVE-2024-6222 be exploited remotely?

    No, CVE-2024-6222 requires an attacker to have gained access to the Docker Desktop VM via a container breakout.

  • What does CVE-2024-6222 allow an attacker to do?

    CVE-2024-6222 allows an attacker to escape from the Docker Desktop VM to the host system.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203