Dastardly Docker Desktop Defect Detected
Get Owned With Just Three Lines Of Python
If you use Docker Desktop, on either Windows or Mac, you are at risk unless you drop everything and update to version 4.44.3. The exploit, a mere 9.3, can evade Docker’s Enhanced Container Isolation and allow an attacker to launch additional Docker containers without needing to mount a socket. The proof of concept “binds the Windows host’s C: drive to the container’s filesystem by using two wget HTTP POST requests“. That gives them access to your whole system and with little effort they could give themselves admin on your Windows system. It is obnoxiously easy to pull off and can be rather hard to detect.
Mac users shouldn’t feel too smug, while there is still a layer of isolation protecting the system from this Docker exploit giving an attacker the ability to mount user directories without a prompt. However, the attacker will still gain complete control over your Docker install and your containers so there is plenty of opportunities for mischief.
Make sure to update as quickly as you can!
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
More Tech News From Around The Web
- Bug bounties: The good, the bad, and the frankly ridiculous ways to do it @ The Register
- Arch Linux takes a pounding as DDoS attack enters week two @ The Register
- Microsoft working on fix for ongoing Outlook email issues @ Bleeping Computer
- ALLPOWERS R600 Portable Power Station Review @ NikKTech
- A Universal Rhythm Guides How We Speak: Global Analysis Reveals 1.6-Second Units @ Slashdot
- Creality Hi-Combo 3D Printer Review @ NikKTech
- CERN’s Large Hadron Collider Runs On A Bendix G-15 In 2025 @ Hackaday
- NVIDIA Jetson AGX Thor Developer Kit Hands-on Blackwell for Robotics @ ServeTheHome


