#VU36754 Deserialization of Untrusted Data in Docker - CVE-2018-15514
Published: September 1, 2018 / Updated: October 27, 2020
Vulnerability identifier: #VU36754
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2018-15514
CWE-ID: CWE-502
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
Docker
Docker
Software vendor:
Docker Inc.
Docker Inc.
Description
The vulnerability allows a remote authenticated user to execute arbitrary code.
HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \.pipedockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
Remediation
Install update from vendor's website.