Docker Desktop 4.44.3 - Unauthenticated API Exposure
Docker Desktop 4.44.3 - Unauthenticated API Exposure
AI Analysis
Technical Summary
The security threat involves an unauthenticated API exposure vulnerability in Docker Desktop version 4.44.3. Docker Desktop is a popular container management tool used primarily on developer workstations and local environments. The vulnerability allows an attacker with local access to the host machine to interact with the Docker API without any authentication. This unauthenticated access can lead to unauthorized command execution, container manipulation, and potentially privilege escalation on the host system. The exploit code is publicly available and written in Perl, which lowers the barrier for exploitation by attackers familiar with scripting. Although the vulnerability is local and requires access to the machine, it can be leveraged by malicious insiders or malware that gains local foothold. No patches or official fixes have been released at the time of this report, and no active exploitation has been detected in the wild. The lack of authentication on a powerful API like Docker's presents a significant security risk, especially in environments where multiple users share workstations or where endpoint security is weak. The vulnerability highlights the importance of securing local access and monitoring Docker API usage. Given Docker Desktop's widespread use among developers and IT professionals, this vulnerability could impact a broad range of organizations globally.
Potential Impact
The impact of this vulnerability is primarily on confidentiality, integrity, and availability of containerized environments managed via Docker Desktop. An attacker with local access can execute arbitrary Docker commands, potentially leading to unauthorized container creation, modification, or deletion. This can disrupt development workflows, cause data loss, or enable further lateral movement within an organization’s network. Privilege escalation is also possible if the attacker leverages the Docker API to gain higher system privileges. Organizations relying on Docker Desktop for development or testing could face operational disruptions and increased risk of insider threats or malware exploitation. The vulnerability does not allow remote exploitation, limiting its impact to environments where local access is possible. However, in shared or poorly secured environments, the risk is significant. The availability of exploit code in Perl further increases the likelihood of exploitation by attackers with moderate technical skills.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict local access to machines running Docker Desktop 4.44.3 to trusted users only. Implement strict endpoint security controls, including user account management and privilege restrictions, to prevent unauthorized local access. Monitor Docker API usage and audit logs for suspicious activity. Disable or limit Docker Desktop API exposure where possible until an official patch is released. Consider using network segmentation and host-based firewalls to control access to Docker services. If feasible, downgrade to a previous Docker Desktop version not affected by this vulnerability or upgrade to a newer version once a patch is available. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect exploitation attempts. Educate users about the risks of running untrusted code or scripts on developer machines. Regularly check Docker and vendor advisories for updates and patches addressing this issue.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Australia, Netherlands, Japan, South Korea, India
Indicators of Compromise
- exploit-code: # Exploit Title: Docker Desktop 4.44.3 - Unauthenticated API Exposure # Date: 2025-10-06 # Exploit Author: OilSeller2001 # Vendor Homepage: https://www.docker.com/ # Software Link: https://www.docker.com/products/docker-desktop/ # Version: Affected on Windows and macOS versions prior to 4.44.3 # Tested on: Windows 11 + Docker Desktop 4.43.0 # Exploit Type: Remote, Local, Shellcode # Platform: Windows # CVE: CVE-2025-9074 # Description: This PoC script exploits a security misconfiguration in the unauthenticated exposure of the Docker Engine API. By sending crafted API requests directly to the Docker daemon, the script creates and starts a specially prepared container. The container leverages the bind mount feature to map sensitive directories from the host filesystem into the container, effectively granting arbitrary access to the host. This results in a high-privilege remote code execution scenario. # Vulnerability Details: The Docker Engine API (TCP port 2375) can be exposed without TLS authentication via the "Expose daemon on tcp://localhost:2375 without TLS" option in Docker Desktop. If this option is enabled, any local or remote attacker with network access to the exposed port can control the Docker daemon without authentication. # Usage: 1. Expose the Docker daemon on TCP 2375 without TLS (testing environment only). 2. Run the PoC against the target: python3 poc_cve_2025_9074.py <target_ip>:2375 3. The script will: - Check API availability - Pull an image - Create a malicious container with bind mounts to the host filesystem - Start the container, allowing access to host files # Mitigation: - Disable the unauthenticated Docker API exposure after testing. - Use TLS certificates if remote API access is required. - Restrict network access to port 2375 via firewall rules. # PoC Download Link: https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
Docker Desktop 4.44.3 - Unauthenticated API Exposure
Description
Docker Desktop 4.44.3 - Unauthenticated API Exposure
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The security threat involves an unauthenticated API exposure vulnerability in Docker Desktop version 4.44.3. Docker Desktop is a popular container management tool used primarily on developer workstations and local environments. The vulnerability allows an attacker with local access to the host machine to interact with the Docker API without any authentication. This unauthenticated access can lead to unauthorized command execution, container manipulation, and potentially privilege escalation on the host system. The exploit code is publicly available and written in Perl, which lowers the barrier for exploitation by attackers familiar with scripting. Although the vulnerability is local and requires access to the machine, it can be leveraged by malicious insiders or malware that gains local foothold. No patches or official fixes have been released at the time of this report, and no active exploitation has been detected in the wild. The lack of authentication on a powerful API like Docker's presents a significant security risk, especially in environments where multiple users share workstations or where endpoint security is weak. The vulnerability highlights the importance of securing local access and monitoring Docker API usage. Given Docker Desktop's widespread use among developers and IT professionals, this vulnerability could impact a broad range of organizations globally.
Potential Impact
The impact of this vulnerability is primarily on confidentiality, integrity, and availability of containerized environments managed via Docker Desktop. An attacker with local access can execute arbitrary Docker commands, potentially leading to unauthorized container creation, modification, or deletion. This can disrupt development workflows, cause data loss, or enable further lateral movement within an organization’s network. Privilege escalation is also possible if the attacker leverages the Docker API to gain higher system privileges. Organizations relying on Docker Desktop for development or testing could face operational disruptions and increased risk of insider threats or malware exploitation. The vulnerability does not allow remote exploitation, limiting its impact to environments where local access is possible. However, in shared or poorly secured environments, the risk is significant. The availability of exploit code in Perl further increases the likelihood of exploitation by attackers with moderate technical skills.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict local access to machines running Docker Desktop 4.44.3 to trusted users only. Implement strict endpoint security controls, including user account management and privilege restrictions, to prevent unauthorized local access. Monitor Docker API usage and audit logs for suspicious activity. Disable or limit Docker Desktop API exposure where possible until an official patch is released. Consider using network segmentation and host-based firewalls to control access to Docker services. If feasible, downgrade to a previous Docker Desktop version not affected by this vulnerability or upgrade to a newer version once a patch is available. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect exploitation attempts. Educate users about the risks of running untrusted code or scripts on developer machines. Regularly check Docker and vendor advisories for updates and patches addressing this issue.
Technical Details
- Edb Id
- 52472
- Has Exploit Code
- true
- Code Language
- perl
Indicators of Compromise
Exploit Source Code
Exploit code for Docker Desktop 4.44.3 - Unauthenticated API Exposure
# Exploit Title: Docker Desktop 4.44.3 - Unauthenticated API Exposure # Date: 2025-10-06 # Exploit Author: OilSeller2001 # Vendor Homepage: https://www.docker.com/ # Software Link: https://www.docker.com/products/docker-desktop/ # Version: Affected on Windows and macOS versions prior to 4.44.3 # Tested on: Windows 11 + Docker Desktop 4.43.0 # Exploit Type: Remote, Local, Shellcode # Platform: Windows # CVE: CVE-2025-9074 # Description: This PoC script exploits a security misconfiguration in th... (1404 more characters)
Threat ID: 69845ddcf9fa50a62f0fd4b0
Added to database: 2/5/2026, 9:07:40 AM
Last enriched: 2/28/2026, 3:04:30 PM
Last updated: 3/23/2026, 2:06:06 AM
Views: 373
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.