First published: Tue Jul 09 2024(Updated: )
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default.
Credit: security@docker.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Docker | <4.29.0 | |
Any of | ||
macOS | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6222 is considered a high-severity vulnerability due to the potential for an attacker to escape from a container to the host system.
To mitigate CVE-2024-6222, upgrade Docker Desktop to version 4.29.0 or later.
CVE-2024-6222 affects Docker Desktop versions prior to 4.29.0.
No, CVE-2024-6222 requires an attacker to have gained access to the Docker Desktop VM via a container breakout.
CVE-2024-6222 allows an attacker to escape from the Docker Desktop VM to the host system.