Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10657: CWE-269 Improper Privilege Management in Docker Docker Desktop

0
High
VulnerabilityCVE-2025-10657cvecve-2025-10657cwe-269
Published: Fri Sep 26 2025 (09/26/2025, 21:05:19 UTC)
Source: CVE Database V5
Vendor/Project: Docker
Product: Docker Desktop

Description

In a hardened Docker environment, with Enhanced Container Isolation ( ECI https://docs.docker.com/enterprise/security/hardened-desktop/enhanced-container-isolation/ ) enabled, an administrator can utilize the command restrictions feature https://docs.docker.com/enterprise/security/hardened-desktop/enhanced-container-isolation/config/#command-restrictions  to restrict commands that a container with a Docker socket mount may issue on that socket. Due to a software bug, the configuration to restrict commands was ignored when passed to ECI, allowing any command to be executed on the socket. This grants excessive privileges by permitting unrestricted access to powerful Docker commands. The vulnerability affects only Docker Desktop 4.46.0 users that have ECI enabled and are using the Docker socket command restrictions feature. In addition, since ECI restricts mounting the Docker socket into containers by default, it only affects containers which are explicitly allowed by the administrator to mount the Docker socket.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:10:05 UTC

Technical Analysis

CVE-2025-10657 is a vulnerability classified under CWE-269 (Improper Privilege Management) affecting Docker Desktop version 4.46.0. In hardened Docker environments where Enhanced Container Isolation (ECI) is enabled, administrators can configure command restrictions to limit the Docker commands that containers with a mounted Docker socket can execute. However, a software bug causes these command restrictions to be ignored when passed to ECI, effectively disabling the intended security control. This flaw allows containers with Docker socket mounts to execute any Docker command without restriction, granting them excessive privileges over the Docker daemon. Since ECI by default restricts mounting the Docker socket into containers, the vulnerability only affects containers explicitly permitted by administrators to mount the socket. The impact is significant because unrestricted Docker socket access can lead to container breakout, privilege escalation, and full control over the host system's Docker environment. The vulnerability has a CVSS 4.0 score of 8.7, indicating high severity, with attack vector local, low attack complexity, privileges required at high level, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits are currently known. This vulnerability highlights the risk of relying solely on command restrictions without proper enforcement in container security mechanisms.

Potential Impact

The vulnerability allows containers with Docker socket mounts to bypass command restrictions and execute any Docker command, effectively granting them elevated privileges over the Docker daemon. This can lead to container breakout, where an attacker escapes container isolation to execute commands on the host system. It also enables unauthorized manipulation of Docker resources such as creating or deleting containers, images, or volumes, potentially disrupting operations or facilitating further attacks. Organizations relying on Docker Desktop 4.46.0 with ECI and socket command restrictions face increased risk of privilege escalation and compromise of containerized environments. The impact extends to confidentiality, integrity, and availability of container workloads and the host system. Since the vulnerability requires local access and the container to have socket mount permission, the risk is mitigated somewhat by ECI's default restrictions, but any misconfiguration or explicit allowance of socket mounts exposes the environment to serious threats. This can affect development, testing, and production environments where Docker Desktop is used with hardened isolation settings.

Mitigation Recommendations

1. Upgrade Docker Desktop to a version later than 4.46.0 where this vulnerability is patched, as relying on the affected version leaves systems exposed. 2. Review and restrict the use of Docker socket mounts in containers; avoid granting socket mount permissions unless absolutely necessary. 3. If socket mounts are required, consider alternative isolation or security mechanisms such as user namespaces, seccomp profiles, or AppArmor/SELinux policies to limit container capabilities. 4. Monitor Docker daemon logs and container activities for unusual commands or behaviors indicative of privilege escalation attempts. 5. Implement strict access controls and auditing on Docker Desktop usage, especially in environments with multiple users or developers. 6. Educate administrators on the risks of command restrictions not being enforced and the importance of verifying security configurations. 7. Consider using container runtime security tools that can detect or prevent unauthorized Docker socket usage or command execution. 8. Temporarily disable ECI or socket command restrictions if they cannot be securely configured until a patch is applied, but only after assessing the security trade-offs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Docker
Date Reserved
2025-09-17T20:55:36.396Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d7025dbc7d242638d7c86c

Added to database: 9/26/2025, 9:15:09 PM

Last enriched: 2/26/2026, 10:10:05 PM

Last updated: 3/24/2026, 10:46:01 PM

Views: 787

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses