vulnerability
Docker CE: Deserialization of Untrusted Data (CVE-2018-15514)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Sep 1, 2018 | Nov 25, 2019 | Apr 7, 2026 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Sep 1, 2018
Added
Nov 25, 2019
Modified
Apr 7, 2026
Description
HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
Solution
docker-ce-upgrade-18_06_0
References
- CVE-2018-15514
- https://attackerkb.com/topics/CVE-2018-15514
- CWE-502
- EUVD-EUVD-2018-7391
- http://www.securityfocus.com/bid/105202
- https://docs.docker.com/docker-for-windows/edge-release-notes/
- https://docs.docker.com/docker-for-windows/release-notes/
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2018-7391
- https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.