Vulnerabilities > Docker > Desktop > High

DATE CVE VULNERABILITY TITLE RISK
2024-07-09 CVE-2024-6222 Unspecified vulnerability in Docker Desktop
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.
local
high complexity
docker
7.0
2023-04-27 CVE-2022-31647 Link Following vulnerability in Docker Desktop
Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.
local
low complexity
docker CWE-59
7.1
2023-04-27 CVE-2022-34292 Link Following vulnerability in Docker Desktop
Docker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647.
local
low complexity
docker CWE-59
7.1
2023-04-27 CVE-2022-37326 Unspecified vulnerability in Docker Desktop
Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class.
local
low complexity
docker
7.8
2023-04-06 CVE-2023-1802 Cleartext Transmission of Sensitive Information vulnerability in Docker Desktop 4.17.0/4.17.1
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information.
network
low complexity
docker CWE-319
7.5
2021-08-12 CVE-2021-37841 Incorrect Permission Assignment for Critical Resource vulnerability in Docker Desktop
Docker Desktop before 3.6.0 suffers from incorrect access control.
local
low complexity
docker CWE-732
7.8