Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2022-37326

Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. This can indirectly lead to privilege escalation.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 11.4%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2022-37326
  • Docker » Desktop » Version: N/A
    cpe:2.3:a:docker:desktop:-
  • Docker » Desktop » Version: 2.1.0.1
    cpe:2.3:a:docker:desktop:2.1.0.1
  • Docker » Desktop » Version: 2.1.0.2
    cpe:2.3:a:docker:desktop:2.1.0.2
  • Docker » Desktop » Version: 2.1.0.3
    cpe:2.3:a:docker:desktop:2.1.0.3
  • Docker » Desktop » Version: 2.1.0.4
    cpe:2.3:a:docker:desktop:2.1.0.4
  • Docker » Desktop » Version: 2.1.0.5
    cpe:2.3:a:docker:desktop:2.1.0.5
  • Docker » Desktop » Version: 2.2.0.0
    cpe:2.3:a:docker:desktop:2.2.0.0
  • Docker » Desktop » Version: 2.2.0.3
    cpe:2.3:a:docker:desktop:2.2.0.3
  • Docker » Desktop » Version: 2.2.0.4
    cpe:2.3:a:docker:desktop:2.2.0.4


Contact Us

Shodan ® - All rights reserved