**Name of the Vulnerable Software and Affected Versions:**
Docker Desktop versions prior to 4.44.3
**Description:**
A critical vulnerability exists in Docker Desktop that allows local Linux containers to access the Docker Engine API via the configured Docker subnet (defaulting to 192.168.65.7:2375). This vulnerability occurs regardless of Enhanced Container Isolation (ECI) being enabled or disabled, and even with the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. Exploitation can lead to the execution of privileged commands on the engine API, including controlling containers, creating new ones, and managing images. In some cases, such as Docker Desktop for Windows with a WSL backend, it also allows mounting the host drive with the same privileges as the user running Docker Desktop. The vulnerability is exploitable through Server-Side Request Forgery (SSRF).
**Recommendations:**
Update Docker Desktop to version 4.44.3 or later.