
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
A vulnerability in the update process of Docker Desktop for Windows versions prior to 4.41.0 allows local, low-privileged attackers to escalate privileges to SYSTEM. The vulnerability exists because during an update, Docker Desktop attempts to delete files and subdirectories under C:\ProgramData\Docker\config with high privileges, but this directory often does not exist by default and C:\ProgramData\ allows normal users to create new directories (NVD).
The vulnerability stems from improper privilege management and link resolution before file access. By creating a malicious Docker\config folder structure at C:\ProgramData, an attacker can force the privileged update process to delete or manipulate arbitrary system files. The vulnerability has been assigned a CVSS v4.0 base score of 7.3 (HIGH) with the vector string CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H. The vulnerability is tracked under CWE-59 (Improper Link Resolution Before File Access) and CWE-269 (Improper Privilege Management) (NVD).
If successfully exploited, this vulnerability allows a local attacker to elevate their privileges to SYSTEM level on affected Windows systems. This enables complete system compromise, as SYSTEM privileges provide the highest level of access on a Windows machine (NVD).
Users should upgrade to Docker Desktop for Windows version 4.41.0 or later to address this vulnerability. No alternative workarounds have been publicly disclosed (NVD).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"