CVE-2023-0629

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/03/2023
Last modified:
07/11/2023

Description

Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to docker.raw.sock, or npipe:////.pipe/docker_engine_linux on Windows, via the -H (--host) CLI flag or the DOCKER_HOST environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker&amp;#39;s raw socket).<br /> <br /> The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.<br /> This issue has been fixed in Docker Desktop 4.17.0. <br /> <br /> Affected Docker Desktop versions: from 4.13.0 before 4.17.0.<br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:docker:docker_desktop:*:*:*:*:*:*:*:* 4.13.0 (including) 4.17.0 (excluding)


References to Advisories, Solutions, and Tools