Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Docker Desktop Vulnerability Leads to Host Compromise

Posted on August 26, 2025August 26, 2025 By CWS

A essential vulnerability in Docker Desktop permits attackers to regulate containers, mount the host’s file system, and modify it to escalate their privileges to these of an administrator.

Tracked as CVE-2025-9074 (CVSS rating of 9.3), the flaw is a container escape situation that impacts the Home windows and macOS iterations of the applying.

“A malicious container working on Docker Desktop might entry the Docker Engine and launch further containers with out requiring the Docker socket to be mounted. This might permit unauthorized entry to consumer recordsdata on the host system,” Docker notes in its advisory.

The safety defect will be triggered no matter whether or not Enhanced Container Isolation (ECI) is enabled or not. Patches for the bug have been included in Docker Desktop model 4.44.3.

The vulnerability, safety researcher Felix Boulet explains, exists as a result of, within the susceptible software variations, any container can entry Docker’s inner HTTP API with out authentication.

This, Boulet says, permits an attacker to connect with the API utilizing the inner IP tackle, create and begin a privileged container, after which mount the host’s file system, gaining full entry to the host.

The Docker Engine socket, which is the administration API for Docker, shouldn’t be uncovered to untrusted code or customers, because it “grants full entry to all the things the docker software can do”, white-hat hacker Philippe Dugre says.

On Home windows, he explains, an attacker might exploit the flaw to mount the host’s file system and overwrite a system DLL to acquire administrative privileges on the host.Commercial. Scroll to proceed studying.

The macOS model of the applying will be exploited to take full management of different containers, or to backdoor the Docker app by mounting and modifying its configuration.

“On macOS, nevertheless, the Docker Desktop software nonetheless has a layer of isolation and making an attempt to mount a consumer listing prompts the consumer for permission. By default, the docker software doesn’t have entry to the remainder of the filesystem and doesn’t run with administrative privileges,” Dugre notes.

He additionally warns that CVE-2025-9074 could be very simple to take advantage of, albeit it requires that the Docker engine runs on Home windows or macOS (most manufacturing techniques run Linux) and that the attacker has entry to the socket.

The attacker can both use a malicious container to mount the assault, or depend on a server-side request forgery (SSRF) assault, proxying requests via a susceptible software.

Associated: Excessive-Severity Vulnerabilities Patched in Chrome, Firefox

Associated: Essential Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Merchandise

Associated: No Patch for Flaw Exposing Tons of of LG Cameras to Distant Hacking

Associated: Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw

Security Week News Tags:Compromise, Desktop, Docker, Host, Leads, Vulnerability

Post navigation

Previous Post: AI Systems Vulnerable to Prompt Injection via Image Scaling Attack

Related Posts

API Security Firm Wallarm Raises $55 Million Security Week News
Misconfigured HMIs Expose US Water Systems to Anyone with a Browser Security Week News
Ransomware Group Claims Attack on Belk Security Week News
North Korean Hackers Use Fake Zoom Updates to Install macOS Malware Security Week News
Cyberattack On Russian Airline Aeroflot Causes the Cancellation of More Than 100 Flights Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Docker Desktop Vulnerability Leads to Host Compromise
  • AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
  • Hundreds of Thousands Affected by Auchan Data Breach
  • X/Twitter The Most Aggressive Social Media App Collecting Users Location Information
  • HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Docker Desktop Vulnerability Leads to Host Compromise
  • AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
  • Hundreds of Thousands Affected by Auchan Data Breach
  • X/Twitter The Most Aggressive Social Media App Collecting Users Location Information
  • HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News