A severe vulnerability, CVE-2025-9074, has been found in Docker Desktop for Windows and Mac, which enables any container to completely take over the host system via a trivial Server-Side Request Forgery (SSRF) attack. The bug was discovered in Docker's own HTTP API, which was exposed at http://192.168.65.7:2375/ without authentication or access control. This exposed API was also reachable from inside any container on the host, which created a serious security boundary infringement and allowed attackers to circumvent Docker's isolation techniques entirely. Exploitation of the vulnerability only needed two HTTP POST requests from inside a container. The first request made a privileged container with the C: drive of the host mounted, and the second one executed the malicious container, providing full access to the host system. Interestingly, attackers could exploit this vulnerability even through SSRF vulnerabilities inside containerized web applications without direct code execution inside the container. The vulnerability was exposed by a security researcher who was doing routine network reconnaissance and found the exposed API with simple tools such as nmap. Docker Desktop for Mac was impacted as well, resulting in a common CVE. Docker was quick to respond, releasing a fix in version 4.44.3 in August 2025. There are no known reports of active exploitation since the patch. This flaw highlights some important teachings in container security: internal APIs should always mandate authentication, robust network segmentation is mandatory, and zero-trust concepts should be enforced on container environments. Docker Desktop users should upgrade to at least version 4.44.3 instantly, and rethink their security strategies to prevent future similar risks.
A security researcher has found a critical flaw in the popular Worldline Yomani XR payment terminal, which could enable attackers to take complete control over the terminal within ...
In a coordinated global operation, international law enforcement agencies have seized the clearnet domain breachforums[.]hn, marking another major takedown of the notorious cybercr...
Trend Micro has uncovered a rapidly growing botnet campaign, RondoDox, which targets a broad range of internet-exposed devices — including routers, DVRs, CCTV systems, and indust...