CVE-2025-9164: CWE-427 Uncontrolled Search Path Element in Docker Docker Desktop
Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's Downloads folder before checking system directories, allowing local privilege escalation through malicious DLL placement.This issue affects Docker Desktop: through 4.48.0.
AI Analysis
Technical Summary
CVE-2025-9164 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting Docker Desktop Installer.exe up to version 4.48.0. The core issue lies in the insecure DLL search order employed by the installer on Windows platforms. Specifically, the installer searches for required DLLs starting in the user's Downloads folder before checking trusted system directories. This behavior allows an attacker with local access and write permissions to the Downloads folder to place a malicious DLL with the same name as a legitimate required DLL. When the installer runs, it loads the malicious DLL instead of the legitimate one, leading to arbitrary code execution within the installer process context. Because the installer typically runs with elevated privileges, this can result in local privilege escalation. The vulnerability requires local access and some level of user privileges but does not require user interaction beyond running the installer. The CVSS 4.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with the complexity of attack and privilege requirements. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where users have write access to their Downloads folder and run Docker Desktop installers. The issue is particularly relevant for organizations heavily reliant on containerized development and deployment workflows on Windows systems. Docker has acknowledged the vulnerability but has not yet released a patch at the time of publication.
Potential Impact
The primary impact of CVE-2025-9164 is local privilege escalation on Windows systems running vulnerable versions of Docker Desktop. An attacker with local access and write permissions to the Downloads folder can execute arbitrary code with elevated privileges during installation or upgrade of Docker Desktop. This can lead to full system compromise, unauthorized access to sensitive containerized environments, and potential lateral movement within enterprise networks. The vulnerability undermines the integrity and availability of the host system and any containers managed by Docker Desktop. Organizations relying on Docker Desktop for development, testing, or production workloads may face increased risk of insider threats or exploitation by malware that gains initial foothold with limited privileges. The lack of user interaction requirement and high impact on system security make this a critical concern for IT security teams. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a likely target for attackers once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-9164, organizations should implement the following specific measures: 1) Restrict write permissions to the user's Downloads folder to prevent unauthorized DLL placement. This can be enforced via group policies or endpoint protection controls. 2) Advise users to run Docker Desktop installers only from trusted locations and avoid running installers from the Downloads folder directly. 3) Use application whitelisting or code integrity policies to block loading of unsigned or untrusted DLLs during installation. 4) Employ least privilege principles by running installers with minimal required privileges and avoid running installers as administrator unless necessary. 5) Monitor file system activity in the Downloads folder for suspicious DLL creation or modification. 6) Once Docker releases an official patch, prioritize timely deployment across all affected systems. 7) Consider using container management solutions that do not rely on vulnerable installer versions or alternative deployment methods until patched. These targeted mitigations go beyond generic advice by focusing on controlling the DLL search path exploitation vector and minimizing the attack surface related to user-writable directories.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, Australia, France, India
CVE-2025-9164: CWE-427 Uncontrolled Search Path Element in Docker Docker Desktop
Description
Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's Downloads folder before checking system directories, allowing local privilege escalation through malicious DLL placement.This issue affects Docker Desktop: through 4.48.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9164 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting Docker Desktop Installer.exe up to version 4.48.0. The core issue lies in the insecure DLL search order employed by the installer on Windows platforms. Specifically, the installer searches for required DLLs starting in the user's Downloads folder before checking trusted system directories. This behavior allows an attacker with local access and write permissions to the Downloads folder to place a malicious DLL with the same name as a legitimate required DLL. When the installer runs, it loads the malicious DLL instead of the legitimate one, leading to arbitrary code execution within the installer process context. Because the installer typically runs with elevated privileges, this can result in local privilege escalation. The vulnerability requires local access and some level of user privileges but does not require user interaction beyond running the installer. The CVSS 4.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with the complexity of attack and privilege requirements. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where users have write access to their Downloads folder and run Docker Desktop installers. The issue is particularly relevant for organizations heavily reliant on containerized development and deployment workflows on Windows systems. Docker has acknowledged the vulnerability but has not yet released a patch at the time of publication.
Potential Impact
The primary impact of CVE-2025-9164 is local privilege escalation on Windows systems running vulnerable versions of Docker Desktop. An attacker with local access and write permissions to the Downloads folder can execute arbitrary code with elevated privileges during installation or upgrade of Docker Desktop. This can lead to full system compromise, unauthorized access to sensitive containerized environments, and potential lateral movement within enterprise networks. The vulnerability undermines the integrity and availability of the host system and any containers managed by Docker Desktop. Organizations relying on Docker Desktop for development, testing, or production workloads may face increased risk of insider threats or exploitation by malware that gains initial foothold with limited privileges. The lack of user interaction requirement and high impact on system security make this a critical concern for IT security teams. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a likely target for attackers once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-9164, organizations should implement the following specific measures: 1) Restrict write permissions to the user's Downloads folder to prevent unauthorized DLL placement. This can be enforced via group policies or endpoint protection controls. 2) Advise users to run Docker Desktop installers only from trusted locations and avoid running installers from the Downloads folder directly. 3) Use application whitelisting or code integrity policies to block loading of unsigned or untrusted DLLs during installation. 4) Employ least privilege principles by running installers with minimal required privileges and avoid running installers as administrator unless necessary. 5) Monitor file system activity in the Downloads folder for suspicious DLL creation or modification. 6) Once Docker releases an official patch, prioritize timely deployment across all affected systems. 7) Consider using container management solutions that do not rely on vulnerable installer versions or alternative deployment methods until patched. These targeted mitigations go beyond generic advice by focusing on controlling the DLL search path exploitation vector and minimizing the attack surface related to user-writable directories.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Docker
- Date Reserved
- 2025-08-19T13:19:17.483Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff7cafba6dffc5e2fbe7a6
Added to database: 10/27/2025, 2:07:43 PM
Last enriched: 2/27/2026, 6:24:07 AM
Last updated: 3/25/2026, 8:33:50 PM
Views: 712
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.