CVE-2024-6222 Vulnerability Details

  /     /     /  

CVE-2024-6222 Metadata Quick Info

CVE Published: 09/07/2024 | CVE Updated: 01/08/2024 | CVE Year: 2024
Source: Docker | Vendor: Docker Inc. | Product: Docker Desktop
Status : PUBLISHED

CVE-2024-6222 Description

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-923
CWE Name: CWE-923: Improper Restriction of Communication Channel to Intended Endpoints
Source: Docker Inc.

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-480
CAPEC Description: CAPEC-480 Escaping Virtualization