As a result of this flaw, an attacker who gains access to a Docker container could leverage the API to create a new Docker container and give it access to a volume that hosts, for example, a database used by a different container, therefore exposing sensitive information.
But more critically, the attacker could mount the operating system’s file system and gain the ability to read or write any file. This has even more serious implications: For example, by overwriting a DLL library loaded by a different application, the attacker could execute malicious code on the system.
However, mounting the OS filesystem administrator works only on Windows, as attempting this on macOS would prompt the user for permission. Also on macOS Docker doesn’t run with administrator privileges like it does on Windows.