Docker Desktop Container Isolation Bypass Vulnerability
CVE-2026-6406
8.8HIGH
What is CVE-2026-6406?
A vulnerability in Docker Desktop allows local attackers to bypass Enhanced Container Isolation (ECI) controls through the Docker CLI’s --use-api-socket flag. When ECI is enabled, socket mounts should be explicitly configured to ensure security. However, the implementation of the --use-api-socket flag circumvents this by adding Docker socket mounts in a manner that the ECI enforcement checks overlook. This flaw can enable attackers to gain unauthorized access to the Docker Engine socket, potentially allowing for privilege escalation and retrieval of sensitive authentication credentials stored by the host user.
Affected Version(s)
Docker Desktop MacOS 4.41.0 < 4.59.0
References
CVSS V4
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Nitesh Surana (niteshsurana.com) of Trend Research
