HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Critical Local Privilege Escalation (CVE‑2025‑XXXX) in Docker Desktop Extension‑Manager

A zero‑day LPE vulnerability (CVSS 8.2) in Docker Desktop’s Extension‑Manager allows attackers who can run high‑privileged code inside a container to elevate to full user rights on the host. Organizations using Docker Desktop on Windows must act quickly to mitigate the risk.

🛡️ LiveThreat™ Intelligence · 📅 April 16, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
zerodayinitiative.com

Critical Local Privilege Escalation (CVE‑2025‑XXXX) in Docker Desktop Extension‑Manager

What Happened – A zero‑day vulnerability (CVSS 8.2) in Docker Desktop’s Extension‑Manager exposes a dangerous function that can be abused for local privilege escalation. An attacker who can run high‑privileged code inside a container can leverage the flaw to gain full user‑level rights on the host system.

Why It Matters for TPRM

  • Docker Desktop is widely deployed across development teams; a compromised developer workstation can become a foothold for lateral movement into corporate networks.
  • The issue bypasses Docker’s existing security model, undermining assumptions about container isolation that many third‑party risk assessments rely on.
  • Exploitation does not require remote access, making it a silent, high‑impact risk for any organization that permits Docker Desktop on employee devices.

Who Is Affected – Technology & SaaS firms, software development agencies, and any enterprise that allows Docker Desktop on Windows workstations (including finance, healthcare, and government development environments).

Recommended Actions

  • Immediately inventory all Windows endpoints running Docker Desktop and verify version.
  • Apply any patches released by Docker; if none are available, disable the Extensions feature or uninstall Docker Desktop on production machines.
  • Enforce least‑privilege container runtimes and restrict execution of high‑privileged code inside containers.
  • Update third‑party risk registers to reflect the new LPE risk and reassess vendor security posture.

Technical Notes – The flaw resides in the Docker Extensions subsystem; an exposed function can be invoked by code executing with elevated container privileges, leading to arbitrary code execution as the current Windows user. CVSS 8.2 (AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). No public exploit is known, but the vulnerability is classified as a zero‑day. Source: Zero Day Initiative advisory

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-258/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.