6.7
CVSSv3

CVE-2020-10665

Published: 18/03/2020 Updated: 22/04/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise prior to 2.1.0.9, Docker Desktop for Windows Stable prior to 2.2.0.4, and Docker Desktop for Windows Edge prior to 2.2.2.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker desktop

Github Repositories

POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation

CVE-2020-10665 Docker Desktop Local Privilege Escalation POC for Docker Desktop Local Privilege Escalation Built based on the writeup at wwwactivecyberus/activelabs/docker-desktop-local-privilege-escalation-cve-2020-10665