First published: Thu Mar 06 2025(Updated: )
A vulnerability exists in Docker Desktop prior to version 4.39.0 that could lead to the unintentional disclosure of sensitive information via application logs. In affected versions, proxy configuration data—potentially including sensitive details—was written to log files in clear text whenever an HTTP GET request was made through a proxy. An attacker with read access to these logs could obtain the proxy information and leverage it for further attacks or unauthorized access. Starting with version 4.39.0, Docker Desktop no longer logs the proxy string, thereby mitigating this risk.
Credit: security@docker.com
Affected Software | Affected Version | How to fix |
---|---|---|
Docker | <4.39.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1696 is considered a medium severity vulnerability due to the risk of sensitive information disclosure.
To mitigate CVE-2025-1696, upgrade Docker Desktop to version 4.39.0 or later to prevent sensitive data from being logged.
CVE-2025-1696 could lead to the exposure of proxy configuration data, which may include sensitive details like authentication tokens.
Docker Desktop versions prior to 4.39.0 are affected by CVE-2025-1696.
While upgrading is the primary remediation, ensure that log files are monitored and managed securely to prevent data exposure.