7.8
CVSSv3

CVE-2020-11492

Published: 05/06/2020 Updated: 12/07/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in Docker Desktop up to and including 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker docker_desktop

Github Repositories

CVE-2020-11492 Proof-of-Concept (PoC) for Docker Desktop for Windows privilege escalation vulnerability This vulnerability was patched in Docker version 2302 on May 11th, 2020 This PoC performs the following: creates a named pipe mimicking docker named pipe \\\\pipe\\dockerLifecycleServer, call ImpersonateNamedPipeClient after connection from docker service, retrieve and