A vulnerability in the update process of Docker Desktop for Windows versions prior to 4.41.0 could allow a local, low-privileged attacker to escalate privileges to SYSTEM. During an update, Docker Desktop attempts to delete files and subdirectories under the path C:\ProgramData\Docker\config with high privileges. However, this directory often does not exist by default, and C:\ProgramData\ allows normal users to create new directories. By creating a malicious Docker\config folder structure at this location, an attacker can force the privileged update process to delete or manipulate arbitrary system files, leading to Elevation of Privilege.
CVE ID: CVE-2025-3224
CVSS Base Severity: HIGH
CVSS Base Score: 7.3
CVSS Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Vendor: Docker
Product: Docker Desktop
EPSS Score: 0.02% (probability of being exploited)
EPSS Percentile: 1.83% (scored less or equal to compared to others)
EPSS Date: 2025-05-27 (when was this score calculated)
SSVC Exploitation: poc
SSVC Technical Impact: total
SSVC Automatable: false