CVE-2023-0629
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/03/2023
Última modificación:
07/11/2023
Descripción
*** Pendiente de traducción *** Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to docker.raw.sock, or npipe:////.pipe/docker_engine_linux on Windows, via the -H (--host) CLI flag or the DOCKER_HOST environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker&#39;s raw socket).<br />
<br />
The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.<br />
This issue has been fixed in Docker Desktop 4.17.0. <br />
<br />
Affected Docker Desktop versions: from 4.13.0 before 4.17.0.<br />
<br />
Impacto
Puntuación base 3.x
7.10
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:docker:docker_desktop:*:*:*:*:*:*:*:* | 4.13.0 (incluyendo) | 4.17.0 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



