Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Docker Desktop Vulnerability Leads to Host Compromise

Docker Desktop Vulnerability Leads to Host Compromise

Posted on August 26, 2025August 26, 2025 By CWS

A essential vulnerability in Docker Desktop permits attackers to regulate containers, mount the host’s file system, and modify it to escalate their privileges to these of an administrator.

Tracked as CVE-2025-9074 (CVSS rating of 9.3), the flaw is a container escape situation that impacts the Home windows and macOS iterations of the applying.

“A malicious container working on Docker Desktop might entry the Docker Engine and launch further containers with out requiring the Docker socket to be mounted. This might permit unauthorized entry to consumer recordsdata on the host system,” Docker notes in its advisory.

The safety defect will be triggered no matter whether or not Enhanced Container Isolation (ECI) is enabled or not. Patches for the bug have been included in Docker Desktop model 4.44.3.

The vulnerability, safety researcher Felix Boulet explains, exists as a result of, within the susceptible software variations, any container can entry Docker’s inner HTTP API with out authentication.

This, Boulet says, permits an attacker to connect with the API utilizing the inner IP tackle, create and begin a privileged container, after which mount the host’s file system, gaining full entry to the host.

The Docker Engine socket, which is the administration API for Docker, shouldn’t be uncovered to untrusted code or customers, because it “grants full entry to all the things the docker software can do”, white-hat hacker Philippe Dugre says.

On Home windows, he explains, an attacker might exploit the flaw to mount the host’s file system and overwrite a system DLL to acquire administrative privileges on the host.Commercial. Scroll to proceed studying.

The macOS model of the applying will be exploited to take full management of different containers, or to backdoor the Docker app by mounting and modifying its configuration.

“On macOS, nevertheless, the Docker Desktop software nonetheless has a layer of isolation and making an attempt to mount a consumer listing prompts the consumer for permission. By default, the docker software doesn’t have entry to the remainder of the filesystem and doesn’t run with administrative privileges,” Dugre notes.

He additionally warns that CVE-2025-9074 could be very simple to take advantage of, albeit it requires that the Docker engine runs on Home windows or macOS (most manufacturing techniques run Linux) and that the attacker has entry to the socket.

The attacker can both use a malicious container to mount the assault, or depend on a server-side request forgery (SSRF) assault, proxying requests via a susceptible software.

Associated: Excessive-Severity Vulnerabilities Patched in Chrome, Firefox

Associated: Essential Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Merchandise

Associated: No Patch for Flaw Exposing Tons of of LG Cameras to Distant Hacking

Associated: Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw

Security Week News Tags:Compromise, Desktop, Docker, Host, Leads, Vulnerability

Post navigation

Previous Post: ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
Next Post: WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs

Related Posts

Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign Security Week News
Shai-Hulud Supply Chain Attack Led to .5 Million Trust Wallet Heist Shai-Hulud Supply Chain Attack Led to $8.5 Million Trust Wallet Heist Security Week News
Vega Secures 0M to Enhance Cybersecurity Analytics Vega Secures $120M to Enhance Cybersecurity Analytics Security Week News
Israeli Cybersecurity Funding Hits .4 Billion Record High Israeli Cybersecurity Funding Hits $4.4 Billion Record High Security Week News
North Korean Hackers Have Stolen  Billion in Cryptocurrency in 2025 North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025 Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News