A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled.
This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://docs.docker.com/desktop/release-notes/#4443 |
![]() ![]() |
History
Wed, 20 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop. | |
Title | Docker Desktop allows unauthenticated access to Docker Engine API from containers | |
Weaknesses | CWE-668 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Docker
Published: 2025-08-20T13:28:35.553Z
Updated: 2025-08-21T03:55:13.910Z
Reserved: 2025-08-15T15:08:07.774Z
Link: CVE-2025-9074

Updated: 2025-08-20T17:27:13.362Z

Status : Awaiting Analysis
Published: 2025-08-20T14:15:49.047
Modified: 2025-08-20T14:39:07.860
Link: CVE-2025-9074

No data.