CVE-2025-9074
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-20

Last updated on: 2025-09-25

Assigner: Docker Inc.

Description
A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-20
Last Modified
2025-09-25
Generated
2026-05-07
AI Q&A
2025-08-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
docker docker_desktop 4.44.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-668 The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Docker Desktop allows local Linux containers to access the Docker Engine API through the configured Docker subnet (default 192.168.65.7:2375). It occurs regardless of whether Enhanced Container Isolation or the option to expose the daemon without TLS is enabled. This access can enable execution of privileged commands on the Docker Engine, such as controlling existing containers, creating new containers, and managing images. In some cases, like Docker Desktop for Windows with WSL backend, it can also allow mounting the host drive with the same privileges as the Docker Desktop user.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized execution of privileged commands on the Docker Engine, including controlling and creating containers and managing images. It may also allow mounting the host drive with user-level privileges, potentially exposing sensitive data or enabling further attacks on the host system. This could compromise the security and integrity of the host and container environments.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart