Categories: Cyber Security News

Critical Windows Docker Desktop Vulnerability Enables Full Host Takeover

A critical security vulnerability in Docker Desktop for Windows has been discovered that allowed any running container to completely compromise the host system through unauthenticated access to the Docker Engine API.

The vulnerability, designated CVE-2025-9074 and carrying a CVSS 4.0 score of 9.3 (Critical), was patched in Docker Desktop version 4.44.3 released on August 20, 2025.

The vulnerability affected Docker Desktop

Sponsored
versions prior to 4.44.3 and allowed local Linux containers to access the Docker Engine API via the configured Docker subnet at 192.168.65.7:2375 by default, completely bypassing authentication mechanisms.

Security researcher who discovered the vulnerability noted that the issue occurred regardless of security configuration settings, including whether Enhanced Container Isolation (ECI) was enabled or the “Expose daemon on tcp://localhost:2375 without TLS” option was configured.

Windows Docker Desktop Vulnerability

The vulnerability’s exploitation required remarkably minimal effort, with attackers needing only two HTTP POST requests from within any container to achieve full host compromise.

The attack vector was so straightforward that it could be executed through Server-Side Request Forgery (SSRF) attacks without requiring direct code execution capabilities within the container.

The proof-of-concept exploit demonstrated how attackers could create a privileged container that mounted the host’s C: drive to a directory within the container, effectively granting complete access to the Windows host filesystem.

The entire attack sequence involved posting a JSON payload to /containers/create to bind the host drive, followed by a POST request to /containers/{id}/start to execute the malicious container.

What made this vulnerability particularly dangerous was its ability to work from any container environment.

As the researcher explained, “a SSRF or a simple web request from any container was enough to full compromise the host”.

This meant that even containers with minimal privileges could escalate to complete system control through the exposed Docker API endpoint.

Critical Infrastructure Impact

The vulnerability posed severe risks to organizations using Docker Desktop for Windows, particularly those running WSL backend configurations.

Sponsored

In these environments, successful exploitation allowed attackers to mount host drives with the same privileges as the user running Docker Desktop, potentially exposing sensitive corporate data and credentials.

Docker responded promptly to address the security gap, with the company acknowledging that “Enhanced Container Isolation (ECI) does not mitigate this vulnerability”.

The fix was included in Docker Desktop 4.44.3, released as part of Docker’s ongoing security update cycle.

The company’s security advisory emphasized the critical nature of the vulnerability, stating that “malicious containers running on Docker Desktop could access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted”.

The vulnerability discovery highlighted fundamental assumptions about container isolation that proved incorrect.

The researcher noted finding the issue “by mistake” while conducting network scans of Docker’s documented private network ranges, emphasizing that “internal interfaces are not inherently secure” and calling for comprehensive testing of network isolation assumptions.

This incident serves as a stark reminder that unauthenticated APIs represent critical security risks regardless of their perceived internal network location, reinforcing the need for zero-trust security principles even within containerized environments.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

The post Critical Windows Docker Desktop Vulnerability Enables Full Host Takeover appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The 7th Tie in Oscars History Just Happened for Best Live Action Short Film

The Oscars just had their seventh tie in the history of the Academy Awards, for…

49 minutes ago

Bans on sugary foods in SNAP programs in 5 states challenged by recipients

A sign explaining restrictions on buying soda and sweetened drinks using Supplemental Nutrition Assistance Program…

3 hours ago

Oscars Winners 2026: The Full List of Winners From the 98th Academy Awards (Live Updates!)

The 98th Academy Awards, also known as The Oscars 2026, have finally arrived and are…

4 hours ago

Big Country Trails & Tales: A look at Texas’ newest state park

BIG COUNTRY, Texas (KTAB/KRBC) - A brand new Texas State Park is now open, and…

5 hours ago

Aether OS is computer in a browser built for the AT Protocol

Aether OS puts a full-fledged desktop in your browser that ties directly into the AT…

7 hours ago

The Best Deals Today: Trails in the Sky 1st Chapter, Dragon Quest VII Reimagined, Nioh 3, and More

A new weekend has arrived, and today, you can save big on Trails in the…

8 hours ago

This website uses cookies.