Vulnerability Details CVE-2018-15514
HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.06
EPSS Ranking 90.4%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2018-15514
-
cpe:2.3:a:docker:docker:1.10.0.0-0
-
cpe:2.3:a:docker:docker:1.10.1.42-1
-
cpe:2.3:a:docker:docker:1.10.2.12
-
cpe:2.3:a:docker:docker:1.10.2.14
-
cpe:2.3:a:docker:docker:1.10.4.0
-
cpe:2.3:a:docker:docker:1.10.6
-
cpe:2.3:a:docker:docker:1.11.0
-
cpe:2.3:a:docker:docker:1.11.1
-
cpe:2.3:a:docker:docker:1.11.2
-
cpe:2.3:a:docker:docker:1.12.0
-
cpe:2.3:a:docker:docker:1.12.1
-
cpe:2.3:a:docker:docker:1.12.2
-
cpe:2.3:a:docker:docker:1.12.3
-
cpe:2.3:a:docker:docker:1.12.5
-
cpe:2.3:a:docker:docker:1.13.0
-
cpe:2.3:a:docker:docker:1.13.1
-
cpe:2.3:a:docker:docker:17.0.4
-
cpe:2.3:a:docker:docker:17.0.5
-
cpe:2.3:a:docker:docker:17.03.0
-
cpe:2.3:a:docker:docker:17.03.1
-
cpe:2.3:a:docker:docker:17.04.0
-
cpe:2.3:a:docker:docker:17.06.0
-
cpe:2.3:a:docker:docker:17.06.1
-
cpe:2.3:a:docker:docker:17.06.2
-
cpe:2.3:a:docker:docker:17.07.0
-
cpe:2.3:a:docker:docker:17.09.0
-
cpe:2.3:a:docker:docker:17.09.1
-
cpe:2.3:a:docker:docker:17.10.0
-
cpe:2.3:a:docker:docker:17.11.0
-
cpe:2.3:a:docker:docker:17.12.0
-
cpe:2.3:a:docker:docker:18.01.0
-
cpe:2.3:a:docker:docker:18.02.0
-
cpe:2.3:a:docker:docker:18.03.0
-
cpe:2.3:a:docker:docker:18.03.1
-
cpe:2.3:a:docker:docker:18.04.0
-
cpe:2.3:a:docker:docker:18.05.0