Impact
The Docker CLI --use-api-socket flag bypasses Enhanced Container Isolation enforcement in Docker Desktop. When ECI is enabled, container Docker socket mounts are denied unless explicitly allowed. The flag adds the socket mount through the HostConfig.Mounts field, which the ECI proxy only inspects for Binds, allowing the mount to pass unchecked. This grants the container full access to the Docker Engine socket and any credentials stored by the host user, enabling the container to issue arbitrary Docker commands on the host and potentially elevate privileges.
Affected Systems
This vulnerability affects Docker Desktop for any version running Enhanced Container Isolation prior to version 4.59.0. Users who can execute Docker CLI commands with the --use-api-socket flag on the host are at risk.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity and a local attack vector. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog; however, the flaw enables privileged host actions for attackers who can run Docker CLI locally. The exploitation requires a local user with Docker command access, but it can lead to full system compromise by allowing manipulation of the Docker Engine and stored credentials.
OpenCVE Enrichment