PT-2025-34057 · Docker · Docker Desktop

Felix Boulet

+1

·

Published

2025-08-20

·

Updated

2025-08-27

·

CVE-2025-9074

CVSS v4.0
9.3
VectorAV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

**Name of the Vulnerable Software and Affected Versions:**

Docker Desktop versions prior to 4.44.3

**Description:**

A critical vulnerability exists in Docker Desktop that allows local Linux containers to access the Docker Engine API via the configured Docker subnet (defaulting to 192.168.65.7:2375). This vulnerability occurs regardless of Enhanced Container Isolation (ECI) being enabled or disabled, and even with the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. Exploitation can lead to the execution of privileged commands on the engine API, including controlling containers, creating new ones, and managing images. In some cases, such as Docker Desktop for Windows with a WSL backend, it also allows mounting the host drive with the same privileges as the user running Docker Desktop. The vulnerability is exploitable through Server-Side Request Forgery (SSRF).

**Recommendations:**

Update Docker Desktop to version 4.44.3 or later.

Exploit

Fix

LPE

Exposure of Resource to Wrong Sphere

Weakness Enumeration

Related Identifiers

BDU:2025-10195
CVE-2025-9074

Affected Products

Docker Desktop