CVE-2025-9074: CWE-668 Exposure of Resource to Wrong Sphere in Docker Docker Desktop
A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.
AI Analysis
Technical Summary
CVE-2025-9074 is a critical vulnerability identified in Docker Desktop version 4.25 that allows local Linux containers to access the Docker Engine API through the configured Docker subnet (default 192.168.65.7:2375). This exposure occurs regardless of whether Enhanced Container Isolation (ECI) is enabled or if the option "Expose daemon on tcp://localhost:2375 without TLS" is disabled. The vulnerability stems from an improper exposure of resources to an incorrect security sphere (CWE-668), meaning that containers, which should be isolated, can interact directly with the Docker Engine API. This API access enables attackers to execute privileged commands such as controlling existing containers, creating new containers, managing images, and potentially escalating privileges. In particular, on Docker Desktop for Windows using the WSL backend, the vulnerability can allow mounting the host drive with the same privileges as the user running Docker Desktop, significantly increasing the risk of host compromise. The CVSS 4.0 score of 9.3 (critical) reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or authentication, although user interaction is required. No known exploits are currently in the wild, but the potential for abuse is substantial given the broad control over the Docker environment that this vulnerability grants.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those relying on Docker Desktop for development, testing, or production environments. Unauthorized access to the Docker Engine API can lead to full container and host compromise, data exfiltration, unauthorized deployment of malicious containers, and disruption of containerized services. Organizations using Docker Desktop on Windows with WSL backend are at heightened risk due to the ability to mount host drives with user-level privileges, potentially exposing sensitive files and credentials. Given the widespread adoption of Docker in European IT infrastructures, including in finance, healthcare, and critical infrastructure sectors, exploitation could lead to significant operational disruption, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. The vulnerability's ability to bypass isolation mechanisms undermines container security models, increasing the attack surface for lateral movement within corporate networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Docker Desktop to a patched version once available from Docker. Until a patch is released, organizations should disable or restrict access to the Docker Engine API on the subnet 192.168.65.7:2375 by implementing strict firewall rules or network segmentation to prevent container access to this endpoint. Avoid running untrusted or unnecessary containers locally, and limit user permissions on Docker Desktop hosts to reduce the impact of potential exploitation. On Windows systems using WSL backend, restrict or monitor mounting operations and consider disabling WSL integration if not essential. Employ runtime security tools that monitor Docker API calls and container behaviors to detect anomalous activities. Additionally, enforce multi-factor authentication and least privilege principles for users managing Docker environments. Regularly audit Docker configurations to ensure that options exposing the daemon without TLS are disabled and that Enhanced Container Isolation settings are properly configured.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-9074: CWE-668 Exposure of Resource to Wrong Sphere in Docker Docker Desktop
Description
A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.
AI-Powered Analysis
Technical Analysis
CVE-2025-9074 is a critical vulnerability identified in Docker Desktop version 4.25 that allows local Linux containers to access the Docker Engine API through the configured Docker subnet (default 192.168.65.7:2375). This exposure occurs regardless of whether Enhanced Container Isolation (ECI) is enabled or if the option "Expose daemon on tcp://localhost:2375 without TLS" is disabled. The vulnerability stems from an improper exposure of resources to an incorrect security sphere (CWE-668), meaning that containers, which should be isolated, can interact directly with the Docker Engine API. This API access enables attackers to execute privileged commands such as controlling existing containers, creating new containers, managing images, and potentially escalating privileges. In particular, on Docker Desktop for Windows using the WSL backend, the vulnerability can allow mounting the host drive with the same privileges as the user running Docker Desktop, significantly increasing the risk of host compromise. The CVSS 4.0 score of 9.3 (critical) reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or authentication, although user interaction is required. No known exploits are currently in the wild, but the potential for abuse is substantial given the broad control over the Docker environment that this vulnerability grants.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those relying on Docker Desktop for development, testing, or production environments. Unauthorized access to the Docker Engine API can lead to full container and host compromise, data exfiltration, unauthorized deployment of malicious containers, and disruption of containerized services. Organizations using Docker Desktop on Windows with WSL backend are at heightened risk due to the ability to mount host drives with user-level privileges, potentially exposing sensitive files and credentials. Given the widespread adoption of Docker in European IT infrastructures, including in finance, healthcare, and critical infrastructure sectors, exploitation could lead to significant operational disruption, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. The vulnerability's ability to bypass isolation mechanisms undermines container security models, increasing the attack surface for lateral movement within corporate networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Docker Desktop to a patched version once available from Docker. Until a patch is released, organizations should disable or restrict access to the Docker Engine API on the subnet 192.168.65.7:2375 by implementing strict firewall rules or network segmentation to prevent container access to this endpoint. Avoid running untrusted or unnecessary containers locally, and limit user permissions on Docker Desktop hosts to reduce the impact of potential exploitation. On Windows systems using WSL backend, restrict or monitor mounting operations and consider disabling WSL integration if not essential. Employ runtime security tools that monitor Docker API calls and container behaviors to detect anomalous activities. Additionally, enforce multi-factor authentication and least privilege principles for users managing Docker environments. Regularly audit Docker configurations to ensure that options exposing the daemon without TLS are disabled and that Enhanced Container Isolation settings are properly configured.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Docker
- Date Reserved
- 2025-08-15T15:08:07.774Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a5d214ad5a09ad000516a8
Added to database: 8/20/2025, 1:48:04 PM
Last enriched: 8/20/2025, 2:02:53 PM
Last updated: 8/23/2025, 4:47:50 AM
Views: 71
Related Threats
CVE-2025-43765: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-9131: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ogulo Ogulo – 360° Tour
MediumCVE-2025-9048: CWE-73 External Control of File Name or Path in wptobe Wptobe-memberships
HighCVE-2025-8062: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wen-solutions WS Theme Addons
MediumCVE-2025-7957: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in surror ShortcodeHub – MultiPurpose Shortcode Builder
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.