An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.
- https://docs.docker.com/docker-for-windows/release-notes/
- https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CrackerCat/CVE-2020-11492
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/fengjixuchui/CVE-2020-11493
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/joshfinley/CVE-2020-11492
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC