First published: Mon Jul 29 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop. An attacker must first obtain the ability to execute high-privileged code within the container in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2024-6222.
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-CAN-23779 vulnerability has been assigned a CVSS rating of 8, indicating a high severity level.
To fix ZDI-CAN-23779, update your Docker Desktop installation to the latest version that addresses this privilege escalation issue.
Users of Docker Desktop who allow local execution of high-privileged code in containers may be affected by ZDI-CAN-23779.
No, ZDI-CAN-23779 requires local access to exploit, as the attacker must execute high-privileged code within the container.
ZDI-CAN-23779 is classified as a privilege escalation vulnerability affecting Docker Desktop.