Docker Desktop shipped with a critical authentication bypass that lets any container access your entire host system. CVE-2025-9074 has a CVSS score of 9.3 - nearly maximum severity - and affects Docker Desktop versions before 4.44.3.
I've been debugging this shit for weeks. The vulnerability is stupid simple: Docker Desktop exposes its internal API on 192.168.65.7:2375
without any authentication. Any container can make HTTP requests to this endpoint and execute Docker commands with full system privileges. It's like Docker handed every container a root shell and said "go wild."
Here's how fucked you are if you haven't patched:
- Attacker runs a malicious container (could be through a compromised base image)
- Container makes API calls to
http://192.168.65.7:2375/containers/create
- Mounts host filesystem with
"Binds": ["/:/host"]
- Creates privileged container with
"Privileged": true
- Game over - full host system access
The attack surface is massive. Every docker run
command from an untrusted image becomes a potential compromise. Every CI/CD pipeline pulling third-party containers is now a security risk. I've seen development teams with hundreds of containers running - any one of them could have taken over their laptops.
Docker's Response Timeline Makes This Worse
Security researcher Felix Boulet discovered this in July, Docker patched it in version 4.44.3, but the security advisory wasn't published until August 20th. That's weeks of developers running vulnerable software without knowing.
Docker's own architecture documentation shows why this happened - they designed Docker Desktop with convenience over security. The daemon runs with elevated privileges and exposes APIs that weren't meant for container access.
Even Docker's Enhanced Container Isolation doesn't stop this attack. ECI is supposed to prevent exactly this kind of container escape, but the vulnerability bypasses those protections entirely.
Production Impact Is Already Happening
Container Attack Vector Analysis
The vulnerability exploits Docker Desktop's internal VM networking to bypass container isolation. Attackers use the exposed API endpoint at 192.168.65.7:2375 to create privileged containers with host filesystem access.
I'm seeing exploitation attempts in the wild. GitHub's security team reported malicious packages trying to exploit this on developer machines. CISA added it to their Known Exploited Vulnerabilities catalog, which means government agencies consider this actively exploited.
The attack works because Docker Desktop creates a VM on Windows/macOS and exposes the Docker API through an internal network interface. Containers inside that VM can reach the Docker API directly. Linux Docker doesn't have this issue because it doesn't use the same VM architecture.
Why This Keeps Happening
Docker has a history of container escape vulnerabilities. This isn't the first time, won't be the last. The fundamental problem is that Docker prioritizes developer experience over security architecture.
Container runtimes like containerd and CRI-O have better security models, but Docker Desktop's convenience features keep introducing attack vectors. Every time they add a new feature, they create new ways for containers to break out.
Development teams need to accept that running untrusted containers on developer laptops is inherently risky. This vulnerability proves that even Docker's security features can't protect against fundamental design flaws.