An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://docs.docker.com/docker-for-windows/release-notes/ | release notes vendor advisory |
https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/ | third party advisory |