CVE-2022-25365
📋 TL;DR
This vulnerability in Docker Desktop for Windows allows attackers to move arbitrary files on the host system. It affects Docker Desktop versions before 4.5.1 on Windows and exists due to an incomplete fix for CVE-2022-23774.
💻 Affected Systems
- Docker Desktop
📦 What is this software?
Docker by Docker
⚠️ Risk & Real-World Impact
Worst Case
Attackers could move critical system files, potentially causing system instability, data loss, or enabling privilege escalation.
Likely Case
Malicious actors could move configuration files, logs, or application data to disrupt operations or hide evidence of compromise.
If Mitigated
With proper access controls and monitoring, impact would be limited to non-critical file movements that can be detected and reversed.
🎯 Exploit Status
Exploitation requires some level of access to the Docker environment. The vulnerability allows file movement but not arbitrary file creation or deletion.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.5.1
Vendor Advisory: https://docs.docker.com/desktop/windows/release-notes/
Restart Required: Yes
Instructions:
1. Open Docker Desktop. 2. Click on the Docker icon in system tray. 3. Select 'Check for Updates'. 4. If update to 4.5.1 is available, click 'Update and Restart'. 5. Alternatively, download and install Docker Desktop 4.5.1 from Docker website.
🔧 Temporary Workarounds
Restrict Docker Desktop Access
windowsLimit user access to Docker Desktop to only authorized administrators
Disable Docker Desktop if Not Required
windowsStop Docker Desktop service if Docker functionality is not actively needed
Stop-Service -Name 'com.docker.service'
🧯 If You Can't Patch
- Implement strict file integrity monitoring on critical system directories
- Restrict Docker Desktop to non-administrative users and monitor for suspicious file operations
🔍 How to Verify
Check if Vulnerable:
Check Docker Desktop version in Settings > About Docker Desktop
Check Version:
docker version --format '{{.Client.Version}}'
Verify Fix Applied:
Verify version is 4.5.1 or later in Docker Desktop settings
📡 Detection & Monitoring
Log Indicators:
- Unexpected file move operations in Docker logs
- Suspicious file system events from Docker processes
Network Indicators:
- Unusual Docker API calls related to file operations
SIEM Query:
source="docker" AND (event="file_move" OR event="rename") AND NOT user="authorized_user"