CVE-2025-9074: Simple SSRF Leads to Complete Docker Escape

Share:

CVE-2025-9074 is a severe security weakness affecting Docker Desktop on Windows and macOS. It allows attackers to escape from containers and gain full control of the host machine by abusing an unauthenticated Docker Engine API socket exposed on the private Docker network.

Discovered in mid-2025 by researchers Felix Boulet and Philippe Dugre, the flaw demonstrated how basic trust assumptions in Docker’s isolation could be broken with minimal effort.

Severity Level: Critical

Vulnerability Details

  • CVE ID: CVE-2025-9074
  • CVSS Score: 9.3
  • The Docker Engine API (http[:]//192.168.65[.]7:2375/) was accessible without authentication to workloads running inside containers. This API exposed powerful management functions (create, delete containers, mount volumes, access host filesystem). As a result, any container could manipulate the Docker host directly, bypassing isolation.
  • Impact varied by platform:
    • Windows – critical, allows full host takeover with admin privileges.
    • macOS – limited impact due to extra permission prompts, but still allowed Docker manipulation and backdooring.
    • Linux – not vulnerable under default configurations since it uses a Unix named pipe rather than a TCP socket.

Exploitation Of The Vulnerability

  • From inside any container exploitation requires only two HTTP POST requests:
    • POST to /containers/create → bind host filesystem (e.g., C:) into a container.
    • POST to /containers/{id}/start → launch the container and start the execution.
  • On macOS, the exploitation requires only 3 lines of python code. Example:
    • import docker
    • client = docker.DockerClient(base_url=”tcp://192.168.65.7:2375″)
    • client.containers.run(“alpine”, “touch /mnt/pwned”, volumes=[“/Users//:/mnt”])

Affected Products

  • Docker Desktop for Windows (all versions prior to 4.44.3)
  • Docker Desktop for macOS (all versions prior to 4.44.3)

Recommendations

  1. Upgrade Docker Desktop to version 4.44.3 or later, which remediates the vulnerability.

Source:

  • https://docs.docker.com/desktop/release-notes/#4443
  • https://blog.qwertysecurity.com/Articles/blog3
  • https://pvotal.tech/breaking-dockers-isolation-using-docker-cve-2025-9074/
  • https://nvd.nist.gov/vuln/detail/CVE-2025-9074

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.