Skip to main content

CVE-2025-9074: CWE-668 Exposure of Resource to Wrong Sphere in Docker Docker Desktop

Critical
VulnerabilityCVE-2025-9074cvecve-2025-9074cwe-668
Published: Wed Aug 20 2025 (08/20/2025, 13:28:35 UTC)
Source: CVE Database V5
Vendor/Project: Docker
Product: Docker Desktop

Description

A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.

AI-Powered Analysis

AILast updated: 08/20/2025, 14:02:53 UTC

Technical Analysis

CVE-2025-9074 is a critical vulnerability identified in Docker Desktop version 4.25 that allows local Linux containers to access the Docker Engine API through the configured Docker subnet (default 192.168.65.7:2375). This exposure occurs regardless of whether Enhanced Container Isolation (ECI) is enabled or if the option "Expose daemon on tcp://localhost:2375 without TLS" is disabled. The vulnerability stems from an improper exposure of resources to an incorrect security sphere (CWE-668), meaning that containers, which should be isolated, can interact directly with the Docker Engine API. This API access enables attackers to execute privileged commands such as controlling existing containers, creating new containers, managing images, and potentially escalating privileges. In particular, on Docker Desktop for Windows using the WSL backend, the vulnerability can allow mounting the host drive with the same privileges as the user running Docker Desktop, significantly increasing the risk of host compromise. The CVSS 4.0 score of 9.3 (critical) reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or authentication, although user interaction is required. No known exploits are currently in the wild, but the potential for abuse is substantial given the broad control over the Docker environment that this vulnerability grants.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those relying on Docker Desktop for development, testing, or production environments. Unauthorized access to the Docker Engine API can lead to full container and host compromise, data exfiltration, unauthorized deployment of malicious containers, and disruption of containerized services. Organizations using Docker Desktop on Windows with WSL backend are at heightened risk due to the ability to mount host drives with user-level privileges, potentially exposing sensitive files and credentials. Given the widespread adoption of Docker in European IT infrastructures, including in finance, healthcare, and critical infrastructure sectors, exploitation could lead to significant operational disruption, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. The vulnerability's ability to bypass isolation mechanisms undermines container security models, increasing the attack surface for lateral movement within corporate networks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade Docker Desktop to a patched version once available from Docker. Until a patch is released, organizations should disable or restrict access to the Docker Engine API on the subnet 192.168.65.7:2375 by implementing strict firewall rules or network segmentation to prevent container access to this endpoint. Avoid running untrusted or unnecessary containers locally, and limit user permissions on Docker Desktop hosts to reduce the impact of potential exploitation. On Windows systems using WSL backend, restrict or monitor mounting operations and consider disabling WSL integration if not essential. Employ runtime security tools that monitor Docker API calls and container behaviors to detect anomalous activities. Additionally, enforce multi-factor authentication and least privilege principles for users managing Docker environments. Regularly audit Docker configurations to ensure that options exposing the daemon without TLS are disabled and that Enhanced Container Isolation settings are properly configured.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Docker
Date Reserved
2025-08-15T15:08:07.774Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a5d214ad5a09ad000516a8

Added to database: 8/20/2025, 1:48:04 PM

Last enriched: 8/20/2025, 2:02:53 PM

Last updated: 8/23/2025, 4:47:50 AM

Views: 71

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats