Privilege Escalation via Trojan Horse Docker Credential

Privilege Escalation via Trojan Horse Docker Credential

CVE-2019-15752 · HIGH Severity

AV:N/AC:M/AU:N/C:C/I:C/A:C

Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command.

Learn more about our Cis Benchmark Audit For Desktop Software.