Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      Blackstone portfolio company R Systems Acquires Novigo Solutions, Strengthening its Product Engineering and Full-Stack Agentic-AI Capabilities

      August 21, 2025

      HoundDog.ai Launches Industry’s First Privacy-by-Design Code Scanner for AI Applications

      August 21, 2025

      The Double-Edged Sustainability Sword Of AI In Web Design

      August 20, 2025

      How VPNs are helping people evade increased censorship – and much more

      August 22, 2025

      Google’s AI Mode can now find restaurant reservations for you – how it works

      August 22, 2025

      Best early Labor Day TV deals 2025: Save up to 50% on Samsung, LG, and more

      August 22, 2025

      Claude wins high praise from a Supreme Court justice – is AI’s legal losing streak over?

      August 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Preserving Data Integrity with Laravel Soft Deletes for Recovery and Compliance

      August 22, 2025
      Recent

      Preserving Data Integrity with Laravel Soft Deletes for Recovery and Compliance

      August 22, 2025

      Quickly Generate Forms based on your Eloquent Models with Laravel Formello

      August 22, 2025

      Pest 4 is Released

      August 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.34: Mint 22.2 Features, FreeVPN Fiasco, Windows Update Killing SSDs, AI in LibreOffice and More

      August 21, 2025
      Recent

      FOSS Weekly #25.34: Mint 22.2 Features, FreeVPN Fiasco, Windows Update Killing SSDs, AI in LibreOffice and More

      August 21, 2025

      You’ll need standalone Word, PowerPoint, Excel on iOS, as Microsoft 365 app becomes a Copilot wrapper

      August 21, 2025

      Microsoft to Move Copilot Previews to iOS While Editing Returns to Office Apps

      August 21, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Critical Vulnerability in Docker Desktop Allows Malicious Containers to Access Host System

    Critical Vulnerability in Docker Desktop Allows Malicious Containers to Access Host System

    August 21, 2025

    CVE-2025-9074

    A severe security vulnerability identified as CVE-2025-9074 has been discovered in Docker Desktop, exposing users to critical risks where malicious containers can gain unauthorized access to the host system. This flaw impacts how Linux containers interact with the Docker Engine, potentially allowing attackers to control the host’s file system and execute privileged commands without proper protection in place. 

    Docker, a widely used platform for containerized application deployment, released an advisory acknowledging a critical flaw in Docker Desktop. The vulnerability enables malicious containers running locally to bypass restrictions and directly access the Docker Engine API through a pre-configured subnet (default address: 192.168.65.7:2375). This access does not require the Docker socket to be mounted, a detail that makes the flaw particularly dangerous. 

    Overview of the CVE-2025-9074 Vulnerability 

    According to the official release notes, malicious containers exploiting CVE-2025-9074 can launch additional containers and manipulate the Docker environment with elevated privileges. This includes the ability to control other containers, manage Docker images, and, in Windows environments using the Windows Subsystem for Linux (WSL) backend, mount the host drive with the permissions of the user running Docker Desktop. Notably, the vulnerability renders existing protective features like Enhanced Container Isolation (ECI) ineffective against this attack vector. 

    Technical Details and Impact 

    The vulnerability affects Docker Desktop versions running Linux containers locally and is indifferent to how security options are configured. Even with the “Expose daemon on tcp://localhost:2375 without TLS” setting disabled, the flaw remains exploitable. 

    A key point emphasized in the vulnerability report is that attackers can send privileged commands to the Docker Engine API by accessing the subnet interface. In environments like Docker Desktop for Windows using the WSL backend, this translates to attackers potentially mounting host drives and accessing sensitive user files with user-level permissions, escalating the severity of the breach. 

    Response and Mitigation 

    Docker promptly responded by releasing updated versions of Docker Desktop, starting with version 4.44.3, issued on August 20, 2025. The update specifically addresses CVE-2025-9074 by patching the vulnerability to prevent unauthorized container access to the Docker Engine. 

    The release notes for Docker Desktop 4.44.3 state: 

    “Fixed CVE-2025-9074, where a malicious container running on Docker Desktop could access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted. This could allow unauthorized access to user files on the host system. Enhanced Container Isolation (ECI) does not mitigate this vulnerability.” 

    Users are strongly urged to upgrade to the latest Docker Desktop versions immediately. Docker Desktop versions older than six months from the latest release are no longer supported or available for download. 

    Recent Docker Desktop Updates 

    This vulnerability comes amid a series of ongoing updates and improvements in Docker Desktop’s ecosystem. Earlier versions like 4.44.2 and 4.44.1 focused on bug fixes and feature enhancements, such as integrating Docker Offload Beta and improving startup stability, especially for WSL 2 users. 

    Version 4.44.0, released in early August 2025, introduced major stability improvements for WSL 2 and added advanced features for running multiple models within Docker Model Runner. It also upgraded core components like Docker Engine to version 28.3.2 and Docker Compose to version 2.39.1. 

    Notably, the Docker team had previously addressed another critical security issue, CVE-2025-23266, related to the NVIDIA Container Toolkit, by updating the toolkit bundled with Docker Desktop to version 1.17.8. 

    The latest Docker Desktop update fixes the critical CVE-2025-9074 vulnerability along with several bugs affecting permissions, Kubernetes, installer stability, and performance. Users, especially those running Linux containers, should update immediately to version 4.44.3 or later, regularly check their versions, and monitor for suspicious activity.

    This highlights the importance of timely patching and security vigilance, as even strong isolation can’t replace regular updates. Docker’s quick response shows its commitment to security, but users must stay proactive to keep their environments safe.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
    Next Article Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025

    Related Posts

    Development

    Preserving Data Integrity with Laravel Soft Deletes for Recovery and Compliance

    August 22, 2025
    Development

    Quickly Generate Forms based on your Eloquent Models with Laravel Formello

    August 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    New SonicBoom Attack Allows Bypass of Authentication for Admin Access

    Security

    Rilasciato Resources 1.8: un moderno monitor di risorse per GNOME

    Linux

    CVE-2025-52467 – PostgreSQL Agentic Interface GitHub Token Exfiltration Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Mixture-of-Agents (MoA): A Breakthrough in LLM Performance

    Machine Learning

    Highlights

    CSS Carousels News & Updates

    CSS Carousels

    April 9, 2025

    The CSS Overflow Module Level 5 specification defines a couple of new features that are…

    Vanillin Market Benefits from Clean Label and Natural Ingredient Trends

    April 10, 2025

    FSP Client – FTP-like interface for File Service Protocol

    June 18, 2025

    CVE-2025-5150 – “Docarray Web API Prototype Pollution Vulnerability”

    May 25, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.