Docker Addresses Critical Container Escape Vulnerability CVE-2025-9074 with CVSS Score of 9.3

August 25, 2025
Container Security / Vulnerability

Docker has released updates to fix a serious security vulnerability in the Docker Desktop application for Windows and macOS. This security flaw, identified as CVE-2025-9074, has a CVSS score of 9.3 out of 10.0, indicating its severity. The issue has been resolved in version 4.44.3. According to Docker’s advisory from last week, “A malicious container running on Docker Desktop could access the Docker Engine and launch additional containers without needing the Docker socket to be mounted.” This could result in unauthorized access to user files on the host system, and Enhanced Container Isolation (ECI) does not provide mitigation for this vulnerability. Security researcher Felix Boulet notes that the vulnerability stems from a container’s ability to connect to the Docker Engine API at 192.168.65[.]7:2375 without requiring any authentication, which could lead to a scenario where a privileged container can…

Docker Addresses Critical Container Escape Vulnerability (CVE-2025-9074) with High CVSS Score

August 25, 2025

In a significant cybersecurity development, Docker has released updates to rectify a critical vulnerability in its Desktop application for Windows and macOS. Known as CVE-2025-9074, this security flaw poses a severe risk, allowing potential attackers to escape the confines of a container, which could lead to unauthorized access to host system files. The vulnerability has been assigned a high severity rating, with a CVSS score of 9.3 out of 10. The issue has been resolved in version 4.44.3 of the Docker Desktop application.

According to Docker’s advisory issued last week, a malicious container operating on Docker Desktop could exploit this flaw to access the Docker Engine. This could enable the attacker to launch additional containers without needing the Docker socket to be mounted, thereby bypassing crucial security controls. Notably, the company emphasized that its Enhanced Container Isolation (ECI) feature does not mitigate the effects of this vulnerability.

Security researcher Felix Boulet has pointed out that the vulnerability is rooted in the ability of a container to connect to the Docker Engine API at 192.168.65[.]7:2375 without requiring any authentication. This lack of authentication opens avenues for privileged containers to interact with the Docker API, drastically elevating the potential for unauthorized actions and data exposure.

The target of this vulnerability encompasses users of the Docker Desktop application across various business sectors, primarily located in the United States. The implications of such a breach are profound, particularly for organizations relying heavily on Docker for containerization in their operational frameworks. The risk of unauthorized data access underscores the importance of timely software updates in safeguarding sensitive information.

Within the context of the MITRE ATT&CK framework, various adversary tactics and techniques are pertinent to this incident. The lack of authentication features in the Docker Engine API illustrates a potential weakness in initial access methods that adversaries could exploit. Furthermore, the ability to escalate privileges via container breakout points to risks associated with privilege escalation tactics, putting user data at an increased risk of exposure.

As Docker users implement the necessary updates, it is crucial for business owners to remain vigilant. Monitoring systems for suspicious activities and enforcing authentication protocols can mitigate risks associated with such vulnerabilities. This incident serves as a reminder of the ever-evolving landscape of cybersecurity threats, emphasizing the necessity for organizations to adopt a proactive stance in their security measures.

In conclusion, the swift action taken by Docker in addressing CVE-2025-9074 is commendable. However, the onus also lies on users to ensure their systems remain secure through regular updates and awareness of potential vulnerabilities. As the cybersecurity landscape continues to evolve, maintaining a rigorous approach to security practices is paramount for all organizations utilizing container technologies.

Source link