Vulnerability Details CVE-2026-2664
An out of bounds read vulnerability in the grpcfuse kernel module present in the Linux VM in Docker Desktop for Windows, Linux and macOS up to version 4.61.0 could allow a local attacker to cause an unspecified impact by writing to /proc/docker entries. The issue has been fixed in Docker Desktop 4.62.0 .
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 2.2%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2026-2664
-
cpe:2.3:a:docker:desktop:*
-
cpe:2.3:a:docker:desktop:3.0.0
-
cpe:2.3:a:docker:desktop:3.0.4
-
cpe:2.3:a:docker:desktop:3.1.0
-
cpe:2.3:a:docker:desktop:3.2.0
-
cpe:2.3:a:docker:desktop:3.2.1
-
cpe:2.3:a:docker:desktop:3.2.2
-
cpe:2.3:a:docker:desktop:3.3.0
-
cpe:2.3:a:docker:desktop:3.3.1
-
cpe:2.3:a:docker:desktop:3.3.2
-
cpe:2.3:a:docker:desktop:3.3.3
-
cpe:2.3:a:docker:desktop:3.4.0
-
cpe:2.3:a:docker:desktop:3.5.0
-
cpe:2.3:a:docker:desktop:3.5.1
-
cpe:2.3:a:docker:desktop:3.5.2
-
cpe:2.3:a:docker:desktop:3.6.0
-
cpe:2.3:a:docker:desktop:4.0.0
-
cpe:2.3:a:docker:desktop:4.0.1
-
cpe:2.3:a:docker:desktop:4.1.0
-
cpe:2.3:a:docker:desktop:4.1.1
-
cpe:2.3:a:docker:desktop:4.10.0
-
cpe:2.3:a:docker:desktop:4.10.1
-
cpe:2.3:a:docker:desktop:4.11.0
-
cpe:2.3:a:docker:desktop:4.11.1
-
cpe:2.3:a:docker:desktop:4.12.0
-
cpe:2.3:a:docker:desktop:4.13.0
-
cpe:2.3:a:docker:desktop:4.13.1
-
cpe:2.3:a:docker:desktop:4.14.0
-
cpe:2.3:a:docker:desktop:4.14.1
-
cpe:2.3:a:docker:desktop:4.15.0
-
cpe:2.3:a:docker:desktop:4.16.0
-
cpe:2.3:a:docker:desktop:4.16.1
-
cpe:2.3:a:docker:desktop:4.16.2
-
cpe:2.3:a:docker:desktop:4.16.3
-
cpe:2.3:a:docker:desktop:4.17.0
-
cpe:2.3:a:docker:desktop:4.17.1
-
cpe:2.3:a:docker:desktop:4.18.0
-
cpe:2.3:a:docker:desktop:4.19.0
-
cpe:2.3:a:docker:desktop:4.2.0
-
cpe:2.3:a:docker:desktop:4.20.0
-
cpe:2.3:a:docker:desktop:4.20.1
-
cpe:2.3:a:docker:desktop:4.21.0
-
cpe:2.3:a:docker:desktop:4.21.1
-
cpe:2.3:a:docker:desktop:4.22.0
-
cpe:2.3:a:docker:desktop:4.22.1
-
cpe:2.3:a:docker:desktop:4.23.0
-
cpe:2.3:a:docker:desktop:4.24.0
-
cpe:2.3:a:docker:desktop:4.24.1
-
cpe:2.3:a:docker:desktop:4.24.2
-
cpe:2.3:a:docker:desktop:4.25.0
-
cpe:2.3:a:docker:desktop:4.25.1
-
cpe:2.3:a:docker:desktop:4.25.2
-
cpe:2.3:a:docker:desktop:4.26.0
-
cpe:2.3:a:docker:desktop:4.26.1
-
cpe:2.3:a:docker:desktop:4.27.0
-
cpe:2.3:a:docker:desktop:4.27.1
-
cpe:2.3:a:docker:desktop:4.27.2
-
cpe:2.3:a:docker:desktop:4.28.0
-
cpe:2.3:a:docker:desktop:4.29.0
-
cpe:2.3:a:docker:desktop:4.3.0
-
cpe:2.3:a:docker:desktop:4.3.1
-
cpe:2.3:a:docker:desktop:4.3.2
-
cpe:2.3:a:docker:desktop:4.30.0
-
cpe:2.3:a:docker:desktop:4.31.0
-
cpe:2.3:a:docker:desktop:4.31.1
-
cpe:2.3:a:docker:desktop:4.32.0
-
cpe:2.3:a:docker:desktop:4.32.1
-
cpe:2.3:a:docker:desktop:4.33.0
-
cpe:2.3:a:docker:desktop:4.33.1
-
cpe:2.3:a:docker:desktop:4.33.2
-
cpe:2.3:a:docker:desktop:4.34.0
-
cpe:2.3:a:docker:desktop:4.34.1
-
cpe:2.3:a:docker:desktop:4.34.2
-
cpe:2.3:a:docker:desktop:4.34.3
-
cpe:2.3:a:docker:desktop:4.34.4
-
cpe:2.3:a:docker:desktop:4.35.0
-
cpe:2.3:a:docker:desktop:4.35.1
-
cpe:2.3:a:docker:desktop:4.35.2
-
cpe:2.3:a:docker:desktop:4.36.0
-
cpe:2.3:a:docker:desktop:4.36.1
-
cpe:2.3:a:docker:desktop:4.37.0
-
cpe:2.3:a:docker:desktop:4.37.1
-
cpe:2.3:a:docker:desktop:4.37.2
-
cpe:2.3:a:docker:desktop:4.38.0
-
cpe:2.3:a:docker:desktop:4.39.0
-
cpe:2.3:a:docker:desktop:4.4.2
-
cpe:2.3:a:docker:desktop:4.4.3
-
cpe:2.3:a:docker:desktop:4.4.4
-
cpe:2.3:a:docker:desktop:4.40.0
-
cpe:2.3:a:docker:desktop:4.41.0
-
cpe:2.3:a:docker:desktop:4.41.1
-
cpe:2.3:a:docker:desktop:4.5.0
-
cpe:2.3:a:docker:desktop:4.5.1
-
cpe:2.3:a:docker:desktop:4.6.0
-
cpe:2.3:a:docker:desktop:4.6.1
-
cpe:2.3:a:docker:desktop:4.7.0
-
cpe:2.3:a:docker:desktop:4.7.1
-
cpe:2.3:a:docker:desktop:4.8.0
-
cpe:2.3:a:docker:desktop:4.9.0
-
cpe:2.3:a:docker:desktop:4.9.1