PT-2025-34057 · Docker · Docker Desktop
Felix Boulet
+1
·
Published
2025-08-20
·
Updated
2026-01-15
·
CVE-2025-9074
CVSS v4.0
9.3
9.3
Critical
| Base vector | Vector | AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions
Docker Desktop versions prior to 4.44.3
Description
A critical vulnerability exists in Docker Desktop that allows local Linux containers to access the Docker Engine API via the configured Docker subnet (defaulting to 192.168.65.7:2375). This issue occurs regardless of Enhanced Container Isolation (ECI) being enabled or disabled, and whether the "Expose daemon on tcp://localhost:2375 without TLS" option is enabled. Successful exploitation can lead to the execution of privileged commands on the API, including controlling containers, creating new ones, and managing images. On Windows systems with a WSL backend, this can also allow mounting the host drive with the same privileges as the user running Docker Desktop. The vulnerability is due to an unauthenticated HTTP API being accessible from within any container. This allows an attacker to potentially gain full control of the host system. The Linux version is less susceptible due to the use of named pipes instead of TCP sockets for API communication.
Recommendations
Update Docker Desktop to version 4.44.3 or later.
Exploit
Fix
LPE
Exposure of Resource to Wrong Sphere
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-10195
CVE-2025-9074
Affected Products
Docker Desktop
References · 158
- 🔥 https://blog.qwertysecurity.com/Articles/blog3 · Exploit
- 🔥 https://pvotal.tech/breaking-dockers-isolation-using-docker-cve-2025-9074 · Exploit
- 🔥 https://github.com/OilSeller2001/PoC-for-CVE-2025-9074 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-9074 · Security Note
- https://bdu.fstec.ru/vul/2025-10195 · Security Note
- https://twitter.com/UndercodeUpdate/status/1963247343735623752 · Twitter Post
- https://reddit.com/r/Action1/comments/1ncpknp/%F0%9D%97%A7%F0%9D%97%BC%F0%9D%97%B1%F0%9D%97%AE%F0%9D%98%86%F0%9D%98%80_%F0%9D%97%A3%F0%9D%97%AE%F0%9D%98%81%F0%9D%97%B0%F0%9D%97%B5_%F0%9D%97%A7%F0%9D%98%82%F0%9D%97%B2%F0%9D%98%80%F0%9D%97%B1%F0%9D%97%AE%F0%9D%98%86_%F0%9D%97%BC%F0%9D%98%83%F0%9D%97%B2%F0%9D%97%BF%F0%9D%98%83%F0%9D%97%B6%F0%9D%97%B2%F0%9D%98%84 · Reddit Post
- https://twitter.com/fernandokarl/status/1958771572413497404 · Twitter Post
- https://twitter.com/CVEnew/status/1958180740115705969 · Twitter Post
- https://twitter.com/ptdbugs/status/1958866018740134301 · Twitter Post
- https://twitter.com/h4x0r_dz/status/1959386275527463262 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1n1cwj2/top_10_trending_cves_27082025 · Reddit Post
- https://twitter.com/RequestbinNet/status/1960515340301164703 · Twitter Post
- https://twitter.com/DefendOpsHQ/status/1960007036655325569 · Twitter Post
- https://twitter.com/MNovofastovsky/status/1976572435354038559 · Twitter Post