cve/2024/CVE-2024-6222.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-08-07 19:02:05 +00:00
### [CVE-2024-6222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6222)
![](https://img.shields.io/static/v1?label=Product&message=Docker%20Desktop&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20v4.29.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints&color=brighgreen)
### Description
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/TayTTo/ContainerAttackTechnique
2024-08-07 19:02:05 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub