Elevation of Privilege Vulnerability in Docker Desktop for Windows by Docker Inc.
CVE-2025-3224

7.3HIGH

Key Information:

Vendor

Docker

Vendor
CVE Published:
28 April 2025

What is CVE-2025-3224?

A security issue in Docker Desktop for Windows versions before 4.41.0 allows local attackers with low privileges to escalate their user permissions to SYSTEM. The flaw occurs during the update process, wherein Docker Desktop attempts to remove files and directories from C:\ProgramData\Docker\config using elevated privileges. Since this directory may not be present by default, a normal user can create a malicious folder structure at this path. This manipulation enables the low-privileged attacker to cause the update mechanism to delete or alter arbitrary system files, resulting in potential escalation of privileges.

Affected Version(s)

Docker Desktop Windows 0 < 4.41.0

References

CVSS V4

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dong-uk Kim, KAIST Hacking Lab
.