Vulnerability Description
Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docker | Docker | < 2.1.0.1 |
| Microsoft | Windows | - |
| Apache | Geode | 1.12.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-PrivilExploitThird Party AdvisoryVDB Entry
- https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741Mailing List
- https://medium.com/%40morgan.henry.roman/elevation-of-privilege-in-docker-for-wiExploitThird Party Advisory
- http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-PrivilExploitThird Party AdvisoryVDB Entry
- https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741Mailing List
- https://medium.com/%40morgan.henry.roman/elevation-of-privilege-in-docker-for-wiExploitThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-US Government Resource
FAQ
What is CVE-2019-15752?
CVE-2019-15752 is a vulnerability with a CVSS score of 7.8 (HIGH). Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-...
How severe is CVE-2019-15752?
CVE-2019-15752 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15752?
Check the references section above for vendor advisories and patch information. Affected products include: Docker Docker, Microsoft Windows, Apache Geode.