CVE-2022-23774
Docker Desktop vulnerability analysis and mitigation

Overview

Docker Desktop before version 4.4.4 on Windows contains a vulnerability (CVE-2022-23774) that allows attackers to move arbitrary files. The vulnerability was discovered in early 2022 and was later found to have an incomplete fix, leading to CVE-2022-25365 (CVE Details).

Technical details

The vulnerability has a CVSS score of 6.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). The specific flaw exists within the Docker Desktop Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability (ZDI Advisory).

Impact

The vulnerability can be leveraged by attackers to create a denial-of-service condition on the system. The impact primarily affects the availability and integrity of the system, with the ability to move arbitrary files potentially disrupting system operations (ZDI Advisory).

Mitigation and workarounds

Docker has issued an update to correct this vulnerability in version 4.4.4. However, the initial fix was incomplete, leading to CVE-2022-25365, which was subsequently addressed in Docker Desktop version 4.5.1 (Docker Release Notes).

Additional resources


SourceThis report was generated using AI

Related Docker Desktop vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-9074CRITICAL9.3
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:desktop
NoYesAug 20, 2025
CVE-2025-9164HIGH8.8
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:docker_desktop
NoNoOct 27, 2025
CVE-2025-10657HIGH8.7
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:desktop
NoNoSep 26, 2025
CVE-2025-6587MEDIUM5.2
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:desktop
NoYesJul 03, 2025
CVE-2025-4095MEDIUM4.3
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:desktop
NoYesApr 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management