Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Docker Desktop Vulnerability Leads to Full Host Compromise

Posted on August 22, 2025August 22, 2025 By CWS

A newly disclosed vulnerability in Docker Desktop for Home windows has revealed how a easy Server-Aspect Request Forgery (SSRF) assault may result in full host system compromise. 

CVE-2025-9074, found by Felix Boulet and reported on August 21, 2025, impacts all Docker Desktop variations previous to 4.44.3 and demonstrates how container isolation may be utterly bypassed by means of unauthenticated API entry. 

Key Takeaways1. Docker Desktop containers can entry unauthenticated API for full host compromise.2. Two HTTP requests create privileged container with host filesystem entry.3. Replace to Docker Desktop instantly.

The vulnerability was discovered by accident throughout routine community scanning and highlights crucial gaps in Docker’s inside safety structure. 

Philippe Dugre from Pvotal Applied sciences independently found an analogous challenge on macOS platforms, emphasizing the cross-platform nature of this safety flaw.

The vulnerability stems from Docker Desktop exposing its inside HTTP API endpoint at with none authentication mechanisms. 

Any container working throughout the Docker atmosphere may entry this endpoint and execute privileged operations in opposition to the host system. 

This represents a elementary breakdown of the container isolation mannequin, the place workloads must be utterly separated from their host atmosphere. 

The assault floor was significantly regarding as a result of it required minimal technical sophistication—attackers wanted solely primary HTTP request capabilities fairly than advanced exploit chains or reminiscence corruption methods.

Docker Container Exploitation Course of

The exploitation course of requires simply two HTTP POST requests executed from inside any container atmosphere. 

The primary request targets the /containers/create endpoint with a JSON payload that configures a brand new privileged container with host filesystem bindings. 

The crucial configuration parameter includes mounting the Home windows C: drive (/mnt/host/c) to a container path (/host_root), successfully offering unrestricted entry to your complete host filesystem. 

The JSON payload additionally specifies execution instructions that run robotically upon container startup, enabling quick post-exploitation actions.

The second HTTP request initiates container execution by means of the /containers/{id}/begin endpoint, triggering the malicious container with elevated privileges. 

This two-step course of bypasses all Docker safety controls and grants attackers the identical stage of entry as native administrator accounts. 

The vulnerability is especially insidious as a result of it may be exploited by means of SSRF assaults, which means attackers don’t require direct code execution inside containers—they solely want the power to set off HTTP requests from compromised net functions or providers working in containerized environments.

Threat FactorsDetailsAffected ProductsDocker Desktop for Home windows (variations ImpactFull host system compromiseExploit Conditions– Entry to any container environment- Skill to make HTTP requests- Community connectivity to 192.168.65.7:2375CVSS 3.1 ScoreNot specified

Proof of Idea 

The proof of idea demonstrates the vulnerability’s simplicity utilizing normal wget instructions executable from any Alpine Linux container. 

The exploit creates a privileged container that mounts the host C: drive and executes arbitrary instructions:

Docker responded shortly to this disclosure, releasing model 4.44.3 with full remediation of the vulnerability. 

The repair implements correct authentication controls for inside API endpoints and strengthens community segmentation between container workloads and Docker’s management aircraft. 

Safety researchers advocate quick updating to the patched model, as no workarounds exist for affected programs.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and reduce incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Compromise, Desktop, Docker, Full, Host, Leads, Vulnerability, Windows

Post navigation

Previous Post: Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
Next Post: South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members

Related Posts

Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide Cyber Security News
Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data Cyber Security News
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
Building a Cyber-Resilient Organization in 2025 Cyber Security News
AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction Cyber Security News
OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
  • Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
  • Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News