The host is installed with Docker Desktop before 3.6.0 and is prone to a code execution vulnerability. A flaw is present in the application, which fails to handle the access control. Successful exploitation could allow an attacker with low privilege to read, write and possibly even execute code inside the containers.