Vulnerability Details CVE-2014-5279
The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.024
EPSS Ranking 84.6%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 9.0
Products affected by CVE-2014-5279
-
cpe:2.3:o:boot2docker:boot2docker:0.1
-
cpe:2.3:o:boot2docker:boot2docker:0.12.0
-
cpe:2.3:o:boot2docker:boot2docker:0.2
-
cpe:2.3:o:boot2docker:boot2docker:0.3.0
-
cpe:2.3:o:boot2docker:boot2docker:0.4.0
-
cpe:2.3:o:boot2docker:boot2docker:0.5.0
-
cpe:2.3:o:boot2docker:boot2docker:0.5.1
-
cpe:2.3:o:boot2docker:boot2docker:0.5.2
-
cpe:2.3:o:boot2docker:boot2docker:0.5.3
-
cpe:2.3:o:boot2docker:boot2docker:0.5.4
-
cpe:2.3:o:boot2docker:boot2docker:0.6.0
-
cpe:2.3:o:boot2docker:boot2docker:0.7.0
-
cpe:2.3:o:boot2docker:boot2docker:0.7.1
-
cpe:2.3:o:boot2docker:boot2docker:0.8.0
-
cpe:2.3:o:boot2docker:boot2docker:0.8.1
-
cpe:2.3:o:boot2docker:boot2docker:0.9.0
-
cpe:2.3:o:boot2docker:boot2docker:0.9.1
-
cpe:2.3:o:boot2docker:boot2docker:1.0.0
-
cpe:2.3:o:boot2docker:boot2docker:1.0.1
-
cpe:2.3:o:boot2docker:boot2docker:1.1.0
-
cpe:2.3:o:boot2docker:boot2docker:1.1.1
-
cpe:2.3:o:boot2docker:boot2docker:1.1.2