Privilege Escalation via Trojan Horse Docker Credential
CVE-2019-15752 · HIGH Severity
AV:N/AC:M/AU:N/C:C/I:C/A:C
Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command.
Learn more about our Cis Benchmark Audit For Desktop Software.