CVE-2025-9074
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-09-25
Assigner: Docker Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| docker | docker_desktop | 4.44.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-668 | The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Docker Desktop allows local Linux containers to access the Docker Engine API through the configured Docker subnet (default 192.168.65.7:2375). It occurs regardless of whether Enhanced Container Isolation or the option to expose the daemon without TLS is enabled. This access can enable execution of privileged commands on the Docker Engine, such as controlling existing containers, creating new containers, and managing images. In some cases, like Docker Desktop for Windows with WSL backend, it can also allow mounting the host drive with the same privileges as the Docker Desktop user.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized execution of privileged commands on the Docker Engine, including controlling and creating containers and managing images. It may also allow mounting the host drive with user-level privileges, potentially exposing sensitive data or enabling further attacks on the host system. This could compromise the security and integrity of the host and container environments.