Advisory Details

May 21st, 2025

Docker Desktop Helper Service Link Following Local Privilege Escalation Vulnerability

ZDI-25-306
ZDI-CAN-23513

CVE ID CVE-2024-5652
CVSS SCORE 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Docker
AFFECTED PRODUCTS Desktop
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the WindowsContainersController class. By creating a junction, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

ADDITIONAL DETAILS Docker has issued an update to correct this vulnerability. More details can be found at:
https://docs.docker.com/desktop/release-notes/#for-windows-19
DISCLOSURE TIMELINE
  • 2024-04-24 - Vulnerability reported to vendor
  • 2025-05-21 - Coordinated public release of advisory
  • 2025-05-21 - Advisory Updated
CREDIT Hashim Jawad (@ihack4falafel)
BACK TO ADVISORIES