Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9164: CWE-427 Uncontrolled Search Path Element in Docker Docker Desktop

0
High
VulnerabilityCVE-2025-9164cvecve-2025-9164cwe-427
Published: Mon Oct 27 2025 (10/27/2025, 13:53:40 UTC)
Source: CVE Database V5
Vendor/Project: Docker
Product: Docker Desktop

Description

Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's Downloads folder before checking system directories, allowing local privilege escalation through malicious DLL placement.This issue affects Docker Desktop: through 4.48.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:24:07 UTC

Technical Analysis

CVE-2025-9164 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting Docker Desktop Installer.exe up to version 4.48.0. The core issue lies in the insecure DLL search order employed by the installer on Windows platforms. Specifically, the installer searches for required DLLs starting in the user's Downloads folder before checking trusted system directories. This behavior allows an attacker with local access and write permissions to the Downloads folder to place a malicious DLL with the same name as a legitimate required DLL. When the installer runs, it loads the malicious DLL instead of the legitimate one, leading to arbitrary code execution within the installer process context. Because the installer typically runs with elevated privileges, this can result in local privilege escalation. The vulnerability requires local access and some level of user privileges but does not require user interaction beyond running the installer. The CVSS 4.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with the complexity of attack and privilege requirements. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where users have write access to their Downloads folder and run Docker Desktop installers. The issue is particularly relevant for organizations heavily reliant on containerized development and deployment workflows on Windows systems. Docker has acknowledged the vulnerability but has not yet released a patch at the time of publication.

Potential Impact

The primary impact of CVE-2025-9164 is local privilege escalation on Windows systems running vulnerable versions of Docker Desktop. An attacker with local access and write permissions to the Downloads folder can execute arbitrary code with elevated privileges during installation or upgrade of Docker Desktop. This can lead to full system compromise, unauthorized access to sensitive containerized environments, and potential lateral movement within enterprise networks. The vulnerability undermines the integrity and availability of the host system and any containers managed by Docker Desktop. Organizations relying on Docker Desktop for development, testing, or production workloads may face increased risk of insider threats or exploitation by malware that gains initial foothold with limited privileges. The lack of user interaction requirement and high impact on system security make this a critical concern for IT security teams. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a likely target for attackers once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-9164, organizations should implement the following specific measures: 1) Restrict write permissions to the user's Downloads folder to prevent unauthorized DLL placement. This can be enforced via group policies or endpoint protection controls. 2) Advise users to run Docker Desktop installers only from trusted locations and avoid running installers from the Downloads folder directly. 3) Use application whitelisting or code integrity policies to block loading of unsigned or untrusted DLLs during installation. 4) Employ least privilege principles by running installers with minimal required privileges and avoid running installers as administrator unless necessary. 5) Monitor file system activity in the Downloads folder for suspicious DLL creation or modification. 6) Once Docker releases an official patch, prioritize timely deployment across all affected systems. 7) Consider using container management solutions that do not rely on vulnerable installer versions or alternative deployment methods until patched. These targeted mitigations go beyond generic advice by focusing on controlling the DLL search path exploitation vector and minimizing the attack surface related to user-writable directories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Docker
Date Reserved
2025-08-19T13:19:17.483Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff7cafba6dffc5e2fbe7a6

Added to database: 10/27/2025, 2:07:43 PM

Last enriched: 2/27/2026, 6:24:07 AM

Last updated: 3/25/2026, 8:33:50 PM

Views: 712

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses