The vulnerability exists due to an exposed dangerous function within the processing of Docker CLI arguments. This flaw allows a local attacker, who has already obtained the ability to execute low-privileged code within a container, to escalate privileges and access resources typically protected by Enhanced Container Isolation.