Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-9074
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Docker Desktop allows unauthenticated access to Docker Engine API from containers
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker subnet, at 192.168.65.7:2375 by default. This vulnerability occurs with or without Enhanced Container Isolation (ECI) enabled, and with or without the "Expose daemon on tcp://localhost:2375 without TLS" option enabled. This can lead to execution of a wide range of privileged commands to the engine API, including controlling other containers, creating new ones, managing images etc. In some circumstances (e.g. Docker Desktop for Windows with WSL backend) it also allows mounting the host drive with the same privileges as the user running Docker Desktop.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
将资源暴露给错误范围
Source: NVD (National Vulnerability Database)
Vulnerability Title
Docker Desktop 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Docker Desktop是美国Docker公司的一个基于容器技术的用于轻量化部署应用的桌面软件。该产品可提供桌面环境可支持在Linux/Windows/Mac OS系统上创建一个容器(轻量级虚拟机)并部署和运行应用程序,以及通过配置文件实现应用程序的自动化安装、部署和升级。 Docker Desktop存在安全漏洞,该漏洞源于本地Linux容器可访问Docker Engine API,可能导致执行特权命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
DockerDocker Desktop 4.25 ~ 4.44.3 -
II. Public POCs for CVE-2025-9074
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/zenzue/CVE-2025-9074POC Details
2New vulnerability found in Docker. Credit for finding the vulnerability goes to Felix Boulethttps://github.com/j3r1ch0123/CVE-2025-9074POC Details
3Nonehttps://github.com/pucagit/CVE-2025-9074POC Details
4Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.https://github.com/OilSeller2001/PoC-for-CVE-2025-9074POC Details
5A vulnerability has been identified in Docker Desktop. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system.https://github.com/BridgerAlderson/CVE-2025-9074-PoCPOC Details
6Docker API CVE-2025-9074 PoC (Proof-Of-Concept). A sophisticated exploitation framework for CVE-2025-9074, targeting unauthenticated Docker API endpoints with an integrated interactive command shell.https://github.com/xwpdx0/poc-2025-9074POC Details
7 Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-EscapePOC Details
8Nonehttps://github.com/pppxo/CVE-2025-9074-PoC-BashPOC Details
9Proof-of-Concept exploit for CVE-2025-9074https://github.com/3rendil/CVE-2025-9074-POCPOC Details
10The Ultimate DAEMON_KILLER. Control is an illusion. This Exploit forces CVE-2025-9074 to break the Docker cage. Advanced Container Escape & Root Escalation toolkit. Verify the vulnerability, take the host, destroy the logs. > We Are Fsociety_https://github.com/fsoc-ghost-0x/CVE-2025-9074_DAEMON_KILLERPOC Details
11Nonehttps://github.com/zaydbf/CVE-2025-9074-PocPOC Details
12一个功能强大的 Docker 远程 API 漏洞利用工具,用于 CVE-2025-9074 漏洞的安全研究和测试。https://github.com/Shaoshi17/CVE-2025-9074-Docker-ExploitPOC Details
13🚀 Exploit CVE-2025-9074 with this Docker escape framework, simplifying API vulnerabilities and enhancing security testing for developers and researchers.https://github.com/KvzinNcpx7/CVE-2025-9074_DAEMON_KILLERPOC Details
14🛠️ Exploit CVE-2025-9074 using this API exploitation framework designed for Docker environments, enhancing your security assessment capabilities.https://github.com/KvzinNcpx7/kvzinncpx7.github.ioPOC Details
15一个容器逃逸漏洞POChttps://github.com/x0da6h/POC-for-CVE-2025-9074POC Details
16CVE-2025-9074: Docker Desktop LPE via Docker Engine API wo/ AuthN in posix shhttps://github.com/matesz44/CVE-2025-9074POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-9074
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-9074

No comments yet


Leave a comment