AI description
CVE-2025-9074 is a security vulnerability found in Docker Desktop that allows local Linux containers to access the Docker Engine API via the configured Docker subnet, which defaults to 192.168.65.7:2375. This vulnerability exists regardless of whether Enhanced Container Isolation (ECI) is enabled or if the "Expose daemon on tcp://localhost:2375 without TLS" option is enabled. The vulnerability allows malicious containers to bypass restrictions and directly access the Docker Engine API, potentially enabling attackers to execute privileged commands, control other containers, manage Docker images, and, in Windows environments using the Windows Subsystem for Linux (WSL) backend, mount the host drive with the permissions of the user running Docker Desktop. This can lead to a complete compromise of the host system.
- Description
- A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.
- Source
- security@docker.com
- NVD status
- Awaiting Analysis
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
- security@docker.com
- CWE-668
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
36
🛑 CVE-2025-9074: Critical vulnerability in Docker Desktop allows access from local containers 🔍 The vulnerability enables privileged access to the Docker Engine API without requiring authentication. It affects even with Enhanced Container Isolation (ECI). Docker fixed the i
@tpx_Security
22 Aug 2025
28 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛑 CVE-2025-9074: Vulnerabilidad crítica en Docker Desktop permite acceso desde contenedores locales 🔍 La vulnerabilidad permite acceso privilegiado a través de la API del Docker Engine sin requerir autenticación. Afecta incluso con aislamiento mejorado (ECI). Docker solu
@tpx_Security
22 Aug 2025
24 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074). https://t.co/75fDDELZZz
@AlexNguyen65
22 Aug 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Weekly vuln radar. https://t.co/Cd6L8ACyLV – spot what’s trending before it’s everywhere: CVE-2025-29927 CVE-2025-43300 CVE-2025-57788 (@chudyPB, Sonny) CVE-2025-9132 (@GoogleDeepMind) CVE-2025-9074 CVE-2025-57790 CVE-2025-57789 CVE-2025-57791 CVE-2024-41787
@ptdbugs
22 Aug 2025
90 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Quick write-up I just published on CVE-2025-9074 and how I managed a full docker escape with two HTTP requests. https://t.co/1dk55RyYEY
@FriendlyHack3r
22 Aug 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074) https://t.co/v2BI3PaFQW #bugbounty
@tbbhunter
22 Aug 2025
780 Impressions
0 Retweets
5 Likes
4 Bookmarks
0 Replies
0 Quotes
Docker Desktop for Windowsにおいて重大な脆弱性(CVE-2025-9074)が発見された。 本脆弱性は、内部HTTP APIがhttp://192.168.65.7:2375/に認証なしで公開されていたことに起因し、任意のコンテナからホストOSへ完全に侵害可能
@yousukezan
22 Aug 2025
21948 Impressions
111 Retweets
258 Likes
96 Bookmarks
0 Replies
4 Quotes
🚨 Critical #Vulnerability in Docker Desktop for Windows (CVE-2025-9074)! Attackers can compromise your host system via SSRF from containers. Update to v4.44.3 NOW to fix this serious flaw. Don't risk total system access! 🔒 #Docker #Cybersecurity https://t.co/YEUBTo5FRS
@fernandokarl
22 Aug 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-9074 はいったいなにがどうなって起きたんだろう?
@ymmt2005
22 Aug 2025
475 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Docker Desktop重大脆弱性CVE-2025-9074、CVSSv4.0スコア9.3クリティカル。コンテナからDocker Engine API直接アクセス可能、v4.44.3で修正済 / 「Docker Desktop」に深刻な脆弱性 - コンテナからAPIアクセスのおそれ https://t.co/jwkcD8p
@__su888
21 Aug 2025
11 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074) https://t.co/ONNLvdEwt3 https://t.co/kd3GASmdjz
@secharvesterx
21 Aug 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074) https://t.co/xShNPQP1E0
@_r_netsec
21 Aug 2025
950 Impressions
5 Retweets
3 Likes
4 Bookmarks
0 Replies
0 Quotes
A critical flaw in Docker Desktop (CVE-2025-9074) lets malicious containers access the host system and control Docker Engine API via a default subnet, affecting Linux container versions. #DockerSecurity #ContainerRisk #USA https://t.co/IWT6P7CTLu
@TweetThreatNews
21 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Docker をWindowsかmacでお使いの皆様、結構深刻な脆弱性が出ていますのでアップデートしてください! # Docker Desktop に深刻な脆弱性。コンテナから Docker Engine のAPIにアクセスすることが可能 (CVE-2025-9074) * CVSSv4.0
@lyiase
21 Aug 2025
1171 Impressions
7 Retweets
8 Likes
2 Bookmarks
0 Replies
0 Quotes
ローカルで悪意のあるコンテナを実行してる時点で問題あると思うけど、まぁContainer Privilege Escalationなのでスコア9.3で高めですね CVE-2025-9074: Docker Desktop allows unauthenticated access to Docker Engine API from containers https://
@minamijoyo
21 Aug 2025
572 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-9074 A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168… https://t.co/vhYNsr6uVN
@CVEnew
20 Aug 2025
202 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes