First published: Thu Apr 27 2023(Updated: )
Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. This can indirectly lead to privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop | <4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37326 is a vulnerability in Docker Desktop for Windows before version 4.6.0 that allows attackers to delete or create any file.
CVE-2022-37326 has a severity level of high, with a severity value of 7.8.
The CVE-2022-37326 vulnerability can be exploited by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class through the dockerBackendV2 windowscontainers/start API in Docker Desktop for Windows before version 4.6.0.
The impact of CVE-2022-37326 is the ability for attackers to delete or create any file, which can indirectly lead to privilege escalation.
To mitigate the CVE-2022-37326 vulnerability, it is recommended to update Docker Desktop for Windows to version 4.6.0 or later, as this version includes a fix for the vulnerability.