First published: Thu Apr 27 2023(Updated: )
Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop | <4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31647 is a vulnerability in Docker Desktop before version 4.6.0 on Windows that allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter.
CVE-2022-31647 affects Docker Desktop before version 4.6.0 on Windows.
CVE-2022-31647 has a severity rating of 7.1, which is considered high.
To mitigate CVE-2022-31647, you should update Docker Desktop to version 4.6.0 or later.
You can find more information about CVE-2022-31647 in the Docker Desktop release notes (https://docs.docker.com/desktop/release-notes/#docker-desktop-460) and in a blog post by CyberArk (https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2).