CVE-2023-0629
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/03/2023
Last modified:
07/11/2023
Description
Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to docker.raw.sock, or npipe:////.pipe/docker_engine_linux on Windows, via the -H (--host) CLI flag or the DOCKER_HOST environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker&#39;s raw socket).<br />
<br />
The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.<br />
This issue has been fixed in Docker Desktop 4.17.0. <br />
<br />
Affected Docker Desktop versions: from 4.13.0 before 4.17.0.<br />
<br />
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:docker:docker_desktop:*:*:*:*:*:*:*:* | 4.13.0 (including) | 4.17.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



