This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.
Metrics
Affected Vendors & Products
Mon, 25 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
ssvc
|
Fri, 22 Aug 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 21 Aug 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Docker
Docker desktop Microsoft Microsoft windows |
|
Vendors & Products |
Docker
Docker desktop Microsoft Microsoft windows |
Wed, 20 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop. | |
Title | Docker Desktop allows unauthenticated access to Docker Engine API from containers | |
Weaknesses | CWE-668 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Docker
Published:
Updated: 2025-08-26T03:55:21.680Z
Reserved: 2025-08-15T15:08:07.774Z
Link: CVE-2025-9074

Updated: 2025-08-25T16:14:21.790Z

Status : Awaiting Analysis
Published: 2025-08-20T14:15:49.047
Modified: 2025-08-22T14:15:47.790
Link: CVE-2025-9074

No data.

Updated: 2025-08-21T12:31:02Z