Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025
      Recent

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025

      Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

      September 28, 2025

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Critical Vulnerability in Docker Desktop Allows Malicious Containers to Access Host System

    Critical Vulnerability in Docker Desktop Allows Malicious Containers to Access Host System

    August 21, 2025

    CVE-2025-9074

    A severe security vulnerability identified as CVE-2025-9074 has been discovered in Docker Desktop, exposing users to critical risks where malicious containers can gain unauthorized access to the host system. This flaw impacts how Linux containers interact with the Docker Engine, potentially allowing attackers to control the host’s file system and execute privileged commands without proper protection in place. 

    Docker, a widely used platform for containerized application deployment, released an advisory acknowledging a critical flaw in Docker Desktop. The vulnerability enables malicious containers running locally to bypass restrictions and directly access the Docker Engine API through a pre-configured subnet (default address: 192.168.65.7:2375). This access does not require the Docker socket to be mounted, a detail that makes the flaw particularly dangerous. 

    Overview of the CVE-2025-9074 Vulnerability 

    According to the official release notes, malicious containers exploiting CVE-2025-9074 can launch additional containers and manipulate the Docker environment with elevated privileges. This includes the ability to control other containers, manage Docker images, and, in Windows environments using the Windows Subsystem for Linux (WSL) backend, mount the host drive with the permissions of the user running Docker Desktop. Notably, the vulnerability renders existing protective features like Enhanced Container Isolation (ECI) ineffective against this attack vector. 

    Technical Details and Impact 

    The vulnerability affects Docker Desktop versions running Linux containers locally and is indifferent to how security options are configured. Even with the “Expose daemon on tcp://localhost:2375 without TLS” setting disabled, the flaw remains exploitable. 

    A key point emphasized in the vulnerability report is that attackers can send privileged commands to the Docker Engine API by accessing the subnet interface. In environments like Docker Desktop for Windows using the WSL backend, this translates to attackers potentially mounting host drives and accessing sensitive user files with user-level permissions, escalating the severity of the breach. 

    Response and Mitigation 

    Docker promptly responded by releasing updated versions of Docker Desktop, starting with version 4.44.3, issued on August 20, 2025. The update specifically addresses CVE-2025-9074 by patching the vulnerability to prevent unauthorized container access to the Docker Engine. 

    The release notes for Docker Desktop 4.44.3 state: 

    “Fixed CVE-2025-9074, where a malicious container running on Docker Desktop could access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted. This could allow unauthorized access to user files on the host system. Enhanced Container Isolation (ECI) does not mitigate this vulnerability.” 

    Users are strongly urged to upgrade to the latest Docker Desktop versions immediately. Docker Desktop versions older than six months from the latest release are no longer supported or available for download. 

    Recent Docker Desktop Updates 

    This vulnerability comes amid a series of ongoing updates and improvements in Docker Desktop’s ecosystem. Earlier versions like 4.44.2 and 4.44.1 focused on bug fixes and feature enhancements, such as integrating Docker Offload Beta and improving startup stability, especially for WSL 2 users. 

    Version 4.44.0, released in early August 2025, introduced major stability improvements for WSL 2 and added advanced features for running multiple models within Docker Model Runner. It also upgraded core components like Docker Engine to version 28.3.2 and Docker Compose to version 2.39.1. 

    Notably, the Docker team had previously addressed another critical security issue, CVE-2025-23266, related to the NVIDIA Container Toolkit, by updating the toolkit bundled with Docker Desktop to version 1.17.8. 

    The latest Docker Desktop update fixes the critical CVE-2025-9074 vulnerability along with several bugs affecting permissions, Kubernetes, installer stability, and performance. Users, especially those running Linux containers, should update immediately to version 4.44.3 or later, regularly check their versions, and monitor for suspicious activity.

    This highlights the importance of timely patching and security vigilance, as even strong isolation can’t replace regular updates. Docker’s quick response shows its commitment to security, but users must stay proactive to keep their environments safe.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
    Next Article Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025

    Related Posts

    Development

    Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

    September 28, 2025
    Development

    Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

    September 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Rethinking Toxic Data in LLM Pretraining: A Co-Design Approach for Improved Steerability and Detoxification

    Machine Learning

    Kong Event Gateway makes it easier to work with Apache Kafka

    Tech & Work

    Beware of phone scams demanding money for ‘missed jury duty’

    Development

    The Return of the UX Generalist

    Web Development

    Highlights

    LLMs Can Now Reason in Parallel: UC Berkeley and UCSF Researchers Introduce Adaptive Parallel Reasoning to Scale Inference Efficiently Without Exceeding Context Windows

    May 3, 2025

    Large language models (LLMs) have made significant strides in reasoning capabilities, exemplified by breakthrough systems…

    Upgrade your Amazon DynamoDB global tables to the current version

    June 4, 2025

    Gartner says add AI agents ASAP – or else. Oh, and they’re also overhyped

    August 27, 2025

    Smashing Security podcast #427: When 2G attacks, and a romantic road trip goes wrong

    July 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.