Symlink Vulnerability in Docker Desktop for Windows
CVE-2022-26659

7.1HIGH

Key Information:

Vendor

Docker

Vendor
CVE Published:
25 March 2022

What is CVE-2022-26659?

The Docker Desktop installer for Windows, prior to version 4.6.0, is susceptible to a symlink vulnerability that allows an attacker to create symbolic links. This exploit can lead to overwriting any files that are writable by the administrator. By leveraging this vulnerability, an attacker could manipulate the log file’s location, potentially leading to unauthorized access or system compromise. The impact is mitigated in version 4.6.0, where the installer is designed to write log files to a secure location that non-administrator users cannot access.

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-26659 : Symlink Vulnerability in Docker Desktop for Windows