The host is installed with Docker Desktop before 2.5.0.0 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in certificate check. Successful exploitation may allow attackers to escalate privileges.