The host is installed with Docker Desktop before 4.17.x and is prone to a bypass vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an unprivileged user to bypass ECI restrictions by setting Docker host to docker.raw.sock.