CVE-2022-34292

7.1 HIGH

📋 TL;DR

This vulnerability in Docker Desktop for Windows allows attackers to overwrite arbitrary files through a symlink attack on the hyperv/create dockerBackendV2 API endpoint. Attackers can control the DataFolder parameter to manipulate DockerDesktop.vhdx files, potentially leading to privilege escalation or system compromise. Only Windows users running vulnerable Docker Desktop versions are affected.

💻 Affected Systems

Products:
  • Docker Desktop for Windows
Versions: All versions before 4.6.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Docker Desktop on Windows; Docker Engine on Linux or other platforms is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary file overwrite leading to privilege escalation, persistence mechanisms, or complete control of the host system.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions on the Windows host system where Docker Desktop is installed.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and least privilege principles in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the Windows system and knowledge of the API endpoint. The CyberArk research provides technical details about the attack methodology.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.6.0 and later

Vendor Advisory: https://docs.docker.com/desktop/release-notes/#docker-desktop-460

Restart Required: Yes

Instructions:

1. Open Docker Desktop application. 2. Click on the Settings/Preferences menu. 3. Navigate to Software Updates. 4. Check for updates and install version 4.6.0 or later. 5. Restart Docker Desktop and the host system if prompted.

🔧 Temporary Workarounds

Disable Hyper-V backend

windows

Switch Docker Desktop to use WSL 2 backend instead of Hyper-V to avoid the vulnerable API endpoint

docker-desktop.exe --switch-backend wsl2

Restrict API access

windows

Configure Windows Firewall to block access to Docker Desktop API endpoints from unauthorized users

🧯 If You Can't Patch

  • Implement strict access controls to limit who can run Docker Desktop on Windows systems
  • Monitor for suspicious file operations involving DockerDesktop.vhdx or symlink creation in Docker-related directories

🔍 How to Verify

Check if Vulnerable:

Check Docker Desktop version in Settings > About Docker Desktop or run: docker version --format '{{.Client.Version}}'

Check Version:

docker version --format '{{.Client.Version}}'

Verify Fix Applied:

Confirm Docker Desktop version is 4.6.0 or higher and verify the hyperv/create API endpoint has proper symlink validation

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls to hyperv/create endpoint
  • Suspicious file operations on DockerDesktop.vhdx
  • Symlink creation in Docker data directories

Network Indicators:

  • Local API calls to Docker Desktop endpoints from unexpected processes

SIEM Query:

Process creation where command_line contains 'dockerBackendV2' AND target_file contains 'DockerDesktop.vhdx'

🔗 References

📤 Share & Export