First published: Mon Jul 29 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop. An attacker must first obtain the ability to execute high-privileged code within the container in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2024-6222.
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1019 is rated at 8 on the CVSS scale, indicating high risk.
To fix ZDI-24-1019, ensure you are running the latest version of Docker Desktop that addresses the vulnerability.
ZDI-24-1019 affects installations of Docker Desktop that allow local attackers to escalate privileges.
No, ZDI-24-1019 requires local access to the affected Docker Desktop installation for exploitation.
Exploitation of ZDI-24-1019 can allow local attackers to gain elevated privileges within the Docker container environment.