# Docker Desktop API未认证访问漏洞
## 概述
Docker Desktop 存在一个安全漏洞,允许本地运行的 Linux 容器通过默认配置的 Docker 子网(如 `192.168.65.7:2375`)访问 Docker Engine API。
## 影响版本
所有支持本地 Linux 容器运行并配置了默认 Docker 子网的 Docker Desktop 版本均可能受影响,无论是否启用以下配置:
- Enhanced Container Isolation (ECI)
- "Expose daemon on tcp://localhost:2375 without TLS" 选项
## 漏洞细节
通过 Docker 默认子网(如 `192.168.65.7:2375`),容器可以访问未受保护的 Docker Engine API。该访问无需认证,攻击者可在容器内直接调用 Docker API 执行如以下操作:
- 控制其他容器(启动、停止、删除)
- 创建新容器
- 管理镜像
- 挂载主机文件系统(在特定配置下,如使用 WSL 后端的 Docker Desktop for Windows)
## 影响
此漏洞可能导致攻击者通过容器实现权限提升与容器逃逸,从而对主机进行未授权操作,尤其在可挂载主机驱动器的情况下,可能造成系统级安全风险。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/zenzue/CVE-2025-9074 | POC详情 |
| 2 | New vulnerability found in Docker. Credit for finding the vulnerability goes to Felix Boulet | https://github.com/j3r1ch0123/CVE-2025-9074 | POC详情 |
| 3 | None | https://github.com/pucagit/CVE-2025-9074 | POC详情 |
| 4 | Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access. | https://github.com/OilSeller2001/PoC-for-CVE-2025-9074 | POC详情 |
| 5 | A vulnerability has been identified in Docker Desktop. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. | https://github.com/BridgerAlderson/CVE-2025-9074-PoC | POC详情 |
| 6 | Docker API CVE-2025-9074 PoC (Proof-Of-Concept). A sophisticated exploitation framework for CVE-2025-9074, targeting unauthenticated Docker API endpoints with an integrated interactive command shell. | https://github.com/xwpdx0/poc-2025-9074 | POC详情 |
| 7 | Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3) | https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape | POC详情 |
| 8 | None | https://github.com/pppxo/CVE-2025-9074-PoC-Bash | POC详情 |
| 9 | Proof-of-Concept exploit for CVE-2025-9074 | https://github.com/3rendil/CVE-2025-9074-POC | POC详情 |
| 10 | The Ultimate DAEMON_KILLER. Control is an illusion. This Exploit forces CVE-2025-9074 to break the Docker cage. Advanced Container Escape & Root Escalation toolkit. Verify the vulnerability, take the host, destroy the logs. > We Are Fsociety_ | https://github.com/fsoc-ghost-0x/CVE-2025-9074_DAEMON_KILLER | POC详情 |
| 11 | None | https://github.com/zaydbf/CVE-2025-9074-Poc | POC详情 |
| 12 | 一个功能强大的 Docker 远程 API 漏洞利用工具,用于 CVE-2025-9074 漏洞的安全研究和测试。 | https://github.com/Shaoshi17/CVE-2025-9074-Docker-Exploit | POC详情 |
| 13 | 🚀 Exploit CVE-2025-9074 with this Docker escape framework, simplifying API vulnerabilities and enhancing security testing for developers and researchers. | https://github.com/KvzinNcpx7/CVE-2025-9074_DAEMON_KILLER | POC详情 |
| 14 | 🛠️ Exploit CVE-2025-9074 using this API exploitation framework designed for Docker environments, enhancing your security assessment capabilities. | https://github.com/KvzinNcpx7/kvzinncpx7.github.io | POC详情 |
| 15 | 一个容器逃逸漏洞POC | https://github.com/x0da6h/POC-for-CVE-2025-9074 | POC详情 |
暂无评论