Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

US HPC research accelerates non-equilibrium quantum materials

Android malware operations massively merge dropper, SMS theft, and RAT capabilities

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Docker Fix CVE-2025-9074, Critical Container Escape Vulnerability with CVSS Score 9.3
Identity

Docker Fix CVE-2025-9074, Critical Container Escape Vulnerability with CVSS Score 9.3

userBy userAugust 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 25, 2025Ravi LakshmananContainer Security/Vulnerabilities

Container Escape Vulnerability

Docker has released fixes to address critical security flaws affecting Docker desktop apps on Windows and MacOS, which could allow attackers to escape from the scope of the container.

The CVSS score for vulnerabilities tracked as CVE-2025-9074 is 9.3 out of 10.0. Addressed in version 4.44.3.

“Malicious containers running on Docker desktops can access the Docker engine and launch additional containers without the need to mount Docker sockets,” Docker said in an advisory released last week.

“This allows for unauthorized access to user files on the host system. Extended Container Isolation (ECI) does not mitigate this vulnerability.”

Cybersecurity

According to security researcher Felix Boolett, the vulnerability relates to how it is possible for a container to connect to the 192.168.65 Docker Engine API.[.]7:2375 When the privileged container installs the C:\ drive without requiring authentication, it opens the door to a scenario where you can fully access the underlying host.

In a proof of concept (POC) exploit, we know that web requests from any container will trigger a flaw and will result in a complete compromise for the host –

Post the JSON payload to “/containers/create”, bind the host c:\ drive to a folder in the container (/mnt/host/c:/host_root), and write what’s under /host_root when container starts using the start command. Post to “/containers/{id}/start” to start the container and start running

“At its core, the vulnerability was simple monitoring, and Docker’s internal HTTP API could be reached from any container without authentication or access control,” Boulet says.

Pvotal Technologies researcher Philippe Dugre (“Zer0x64”) said that attackers could exploit a flaw in the Windows version of Docker desktop to mount the entire file system as an administrator, read sensitive files, and overwrite system DLLs to escalate the attacker to the host system’s administrator.

“However, on MacOS, Docker desktop applications still have a separator layer, and if you try to mount a user directory, you’ll be asked for permission,” Dugre said. “By default, the Docker application does not have access to the rest of the file system and does not run with administrative privileges, so the host is much more secure than in windows.”

“However, attackers still have full control over the Docker application/container and can even backdoor by installing and modifying the application’s configuration, but no user approval is required.”

Identity Security Risk Assessment

Linux does not rely on TCP TCP sockets in the Docker Engine API, and does not affect Linux versions as Linux uses named pipes for the host’s file system.

The easiest way to exploit vulnerabilities is through malicious containers controlled by threat actors. That being said, server-side request forgery (SSRF) flaws can be used as alternative attack vectors.

“The vulnerability allows an attacker to enable proxy requests through vulnerable applications and reach Docker sockets. The impact depends, among other things, on the availability of the HTTP request method (most SSRFs only allow retrieve requests, but allow the use of posts, patches, and deletion methods),” Dugre said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleElon Musk’s Xai sues Apple and Openai, claiming anti-competitive conspiracy
Next Article UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats
user
  • Website

Related Posts

Android malware operations massively merge dropper, SMS theft, and RAT capabilities

December 22, 2025

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

US HPC research accelerates non-equilibrium quantum materials

Android malware operations massively merge dropper, SMS theft, and RAT capabilities

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.