First published: Thu Apr 27 2023(Updated: )
Docker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop | <4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-34292.
The severity of CVE-2022-34292 is high, with a severity value of 7.1.
The affected software is Docker Desktop for Windows before version 4.6.0.
An attacker can exploit this vulnerability by using a symlink attack on the hyperv/create dockerBackendV2 API and controlling the DataFolder parameter for DockerDesktop.vhdx.
Yes, you can find more information about this vulnerability in the Docker Desktop release notes (https://docs.docker.com/desktop/release-notes/#docker-desktop-460) and in a blog post published by CyberArk (https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2).