⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..

CVE-2019-15752

Severity
7.8HIGH
EPSS
49.3%
top 2.21%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedAug 28
KEV addedNov 3
KEV dueMay 3
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.

Description

Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDdocker/docker< 2.1.0.1
NVDapache/geode1.12.0

🔴Vulnerability Details

3
GHSA
GHSA-pg68-prcj-h956: Docker Desktop Community Edition before 22022-05-24
CVEList
CVE-2019-15752: Docker Desktop Community Edition before 22019-08-28
VulnCheck
Docker Desktop Community Edition Privilege Escalation Vulnerability2019

💥Exploits & PoCs

1
Exploit-DB
Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)2020-04-28

📋Vendor Advisories

2
CISA
Docker Desktop Community Edition Privilege Escalation Vulnerability2021-11-03
Debian
CVE-2019-15752: docker.io - Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privi...2019