Vulnerability Description
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docker | Desktop | 4.17.0 |
Related Weaknesses (CWE)
References
- https://docs.docker.com/desktop/release-notes/#4180Release Notes
- https://github.com/docker/for-win/issues/13344Exploit
- https://docs.docker.com/desktop/release-notes/#4180Release Notes
- https://github.com/docker/for-win/issues/13344Exploit
FAQ
What is CVE-2023-1802?
CVE-2023-1802 is a vulnerability with a CVSS score of 5.9 (MEDIUM). In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a d...
How severe is CVE-2023-1802?
CVE-2023-1802 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1802?
Check the references section above for vendor advisories and patch information. Affected products include: Docker Desktop.