PT-2025-34057 · Docker · Docker Desktop

Felix Boulet

+1

·

Published

2025-08-20

·

Updated

2026-01-15

·

CVE-2025-9074

CVSS v4.0
9.3
VectorAV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Name of the Vulnerable Software and Affected Versions Docker Desktop versions prior to 4.44.3
Description A critical vulnerability exists in Docker Desktop that allows local Linux containers to access the Docker Engine API via the configured Docker subnet (defaulting to 192.168.65.7:2375). This issue occurs regardless of Enhanced Container Isolation (ECI) being enabled or disabled, and whether the "Expose daemon on tcp://localhost:2375 without TLS" option is enabled. Successful exploitation can lead to the execution of privileged commands on the API, including controlling containers, creating new ones, and managing images. On Windows systems with a WSL backend, this can also allow mounting the host drive with the same privileges as the user running Docker Desktop. The vulnerability is due to an unauthenticated HTTP API being accessible from within any container. This allows an attacker to potentially gain full control of the host system. The Linux version is less susceptible due to the use of named pipes instead of TCP sockets for API communication.
Recommendations Update Docker Desktop to version 4.44.3 or later.

Exploit

Fix

LPE

Exposure of Resource to Wrong Sphere

Weakness Enumeration

Related Identifiers

BDU:2025-10195
CVE-2025-9074

Affected Products

Docker Desktop