Home

Description

The Docker CLI --use-api-socket flag bypasses Enhanced Container Isolation (ECI) restrictions in Docker Desktop. When ECI is enabled, Docker socket mounts from containers are denied unless explicitly allowed via the admin-settings configuration. However, the --use-api-socket flag adds the Docker socket mount via the HostConfig.Mounts field rather than the HostConfig.Binds field. The ECI enforcement in the Docker Desktop API proxy only inspected Binds, allowing the mount to pass unchecked. This grants a container full access to the Docker Engine socket and, if the host user has logged in to container registries, their authentication credentials. A local attacker with the ability to run Docker CLI commands can exploit this to escape ECI restrictions, access the Docker Engine, and potentially escalate privileges.

PUBLISHED Reserved 2026-04-15 | Published 2026-05-22 | Updated 2026-05-23 | Assigner Docker




HIGH: 8.8CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

HIGH: 8.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-863: Incorrect Authorization

Product status

Default status
unaffected

4.41.0 (semver) before 4.59.0
affected

Credits

Nitesh Surana (niteshsurana.com) of Trend Research finder

References

docs.docker.com/desktop/release-notes/ release-notes

www.zerodayinitiative.com/advisories/ZDI-26-299/ third-party-advisory

cve.org (CVE-2026-6406)

nvd.nist.gov (CVE-2026-6406)

Download JSON