Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

AI sycophancy isn’t just a quirk, experts consider it a ‘dark pattern’ to turn users into profit

UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Docker Fix CVE-2025-9074, Critical Container Escape Vulnerability with CVSS Score 9.3
Identity

Docker Fix CVE-2025-9074, Critical Container Escape Vulnerability with CVSS Score 9.3

userBy userAugust 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 25, 2025Ravi LakshmananContainer Security/Vulnerabilities

Container Escape Vulnerability

Docker has released fixes to address critical security flaws affecting Docker desktop apps on Windows and MacOS, which could allow attackers to escape from the scope of the container.

The CVSS score for vulnerabilities tracked as CVE-2025-9074 is 9.3 out of 10.0. Addressed in version 4.44.3.

“Malicious containers running on Docker desktops can access the Docker engine and launch additional containers without the need to mount Docker sockets,” Docker said in an advisory released last week.

“This allows for unauthorized access to user files on the host system. Extended Container Isolation (ECI) does not mitigate this vulnerability.”

Cybersecurity

According to security researcher Felix Boolett, the vulnerability relates to how it is possible for a container to connect to the 192.168.65 Docker Engine API.[.]7:2375 When the privileged container installs the C:\ drive without requiring authentication, it opens the door to a scenario where you can fully access the underlying host.

In a proof of concept (POC) exploit, we know that web requests from any container will trigger a flaw and will result in a complete compromise for the host –

Post the JSON payload to “/containers/create”, bind the host c:\ drive to a folder in the container (/mnt/host/c:/host_root), and write what’s under /host_root when container starts using the start command. Post to “/containers/{id}/start” to start the container and start running

“At its core, the vulnerability was simple monitoring, and Docker’s internal HTTP API could be reached from any container without authentication or access control,” Boulet says.

Pvotal Technologies researcher Philippe Dugre (“Zer0x64”) said that attackers could exploit a flaw in the Windows version of Docker desktop to mount the entire file system as an administrator, read sensitive files, and overwrite system DLLs to escalate the attacker to the host system’s administrator.

“However, on MacOS, Docker desktop applications still have a separator layer, and if you try to mount a user directory, you’ll be asked for permission,” Dugre said. “By default, the Docker application does not have access to the rest of the file system and does not run with administrative privileges, so the host is much more secure than in windows.”

“However, attackers still have full control over the Docker application/container and can even backdoor by installing and modifying the application’s configuration, but no user approval is required.”

Identity Security Risk Assessment

Linux does not rely on TCP TCP sockets in the Docker Engine API, and does not affect Linux versions as Linux uses named pipes for the host’s file system.

The easiest way to exploit vulnerabilities is through malicious containers controlled by threat actors. That being said, server-side request forgery (SSRF) flaws can be used as alternative attack vectors.

“The vulnerability allows an attacker to enable proxy requests through vulnerable applications and reach Docker sockets. The impact depends, among other things, on the availability of the HTTP request method (most SSRFs only allow retrieve requests, but allow the use of posts, patches, and deletion methods),” Dugre said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThetruthspy phone spyware new security flaw puts victims at risk
Next Article UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats
user
  • Website

Related Posts

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

August 25, 2025

UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats

August 25, 2025

Phishing campaigns deliver rat payloads using upcrypter with fake voicemail email

August 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

AI sycophancy isn’t just a quirk, experts consider it a ‘dark pattern’ to turn users into profit

UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats

Docker Fix CVE-2025-9074, Critical Container Escape Vulnerability with CVSS Score 9.3

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.