Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9164: CWE-427 Uncontrolled Search Path Element in Docker Docker Desktop

0
High
VulnerabilityCVE-2025-9164cvecve-2025-9164cwe-427
Published: Mon Oct 27 2025 (10/27/2025, 13:53:40 UTC)
Source: CVE Database V5
Vendor/Project: Docker
Product: Docker Desktop

Description

Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's Downloads folder before checking system directories, allowing local privilege escalation through malicious DLL placement.This issue affects Docker Desktop: through 4.48.0.

AI-Powered Analysis

AILast updated: 10/27/2025, 14:22:51 UTC

Technical Analysis

CVE-2025-9164 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting Docker Desktop Installer.exe up to version 4.48.0. The core issue stems from the installer’s DLL search order, which prioritizes the user's Downloads folder over system directories when loading required DLLs. This insecure search order allows an attacker with local access to place a malicious DLL in the Downloads folder, which the installer will load instead of the legitimate system DLL. This results in local privilege escalation, as the malicious DLL executes with elevated installer privileges. The vulnerability requires the attacker to have at least limited local privileges to place the DLL and for the user or attacker to run the installer executable. The CVSS 4.0 vector indicates a local attack vector (AV:L), high attack complexity (AC:H), partial privileges required (PR:L), and no user interaction (UI:N) once the installer is run. The impact on confidentiality, integrity, and availability is high, as the attacker can execute arbitrary code with elevated privileges, potentially leading to full system compromise. No public exploits are currently known, but the vulnerability is rated high severity (CVSS 8.8). The issue is particularly relevant for environments where Docker Desktop is installed or updated frequently, especially on Windows systems where DLL hijacking is a common attack vector. The lack of patch links suggests that a fix is pending or not yet publicly released, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk of local privilege escalation on systems running Docker Desktop, which is widely used in software development, testing, and production environments. Successful exploitation could allow attackers to gain elevated privileges, bypass security controls, and potentially move laterally within corporate networks. This could lead to unauthorized access to sensitive data, disruption of containerized applications, and compromise of development pipelines. Organizations with remote or hybrid workforces may face increased risk if endpoint security is lax, as attackers could exploit compromised user machines. The vulnerability also threatens the integrity of software supply chains relying on Docker Desktop, potentially impacting DevOps workflows. Given the high CVSS score and the critical role of Docker in modern IT infrastructure, the impact on confidentiality, integrity, and availability is substantial, especially if combined with other vulnerabilities or social engineering tactics.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict write permissions to the Downloads folder and other user-writable directories to prevent unauthorized DLL placement. 2) Advise users and administrators to run Docker Desktop installers only from trusted, secure locations, avoiding execution directly from the Downloads folder. 3) Employ application whitelisting and endpoint protection solutions that can detect and block unauthorized DLL loading or suspicious installer behavior. 4) Monitor file system changes in user directories for anomalous DLL files. 5) Temporarily disable automatic updates or installations of Docker Desktop until a vendor patch is released. 6) Educate users about the risks of running installers from untrusted sources and the importance of verifying installer integrity. 7) Once available, promptly apply official patches from Docker to correct the DLL search order and eliminate the vulnerability. 8) Consider isolating development environments or using virtual machines to limit the impact of potential local exploits. These targeted actions go beyond generic advice by focusing on controlling the DLL search path exploitation vector and securing user environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Docker
Date Reserved
2025-08-19T13:19:17.483Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff7cafba6dffc5e2fbe7a6

Added to database: 10/27/2025, 2:07:43 PM

Last enriched: 10/27/2025, 2:22:51 PM

Last updated: 10/27/2025, 4:47:09 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats