Vulnerability Description
Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docker | Desktop | < 4.6.0 |
Related Weaknesses (CWE)
References
- https://docs.docker.com/desktop/release-notes/#docker-desktop-460Release Notes
- https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-piThird Party Advisory
- https://docs.docker.com/desktop/release-notes/#docker-desktop-460Release Notes
- https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-piThird Party Advisory
FAQ
What is CVE-2022-31647?
CVE-2022-31647 is a vulnerability with a CVSS score of 7.1 (HIGH). Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-...
How severe is CVE-2022-31647?
CVE-2022-31647 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-31647?
Check the references section above for vendor advisories and patch information. Affected products include: Docker Desktop.