Home

Description

Docker Desktop for Windows contains multiple incorrect permission assignment vulnerabilities in the installer's handling of the C:\ProgramData\DockerDesktop directory. The installer creates this directory without proper ownership verification, creating two exploitation scenarios: Scenario 1 (Persistent Attack): If a low-privileged attacker pre-creates C:\ProgramData\DockerDesktop before Docker Desktop installation, the attacker retains ownership of the directory even after the installer applies restrictive ACLs. At any time after installation completes, the attacker can modify the directory ACL (as the owner) and tamper with critical configuration files such as install-settings.json to specify a malicious credentialHelper, causing arbitrary code execution when any user runs Docker Desktop. Scenario 2 (TOCTOU Attack): During installation, there is a time-of-check-time-of-use (TOCTOU) race condition between when the installer creates C:\ProgramData\DockerDesktop and when it sets secure ACLs. A low-privileged attacker actively monitoring for the installation can inject malicious files (such as install-settings.json) with attacker-controlled ACLs during this window, achieving the same code execution outcome.

PUBLISHED Reserved 2025-12-15 | Published 2026-02-04 | Updated 2026-02-05 | Assigner Docker




MEDIUM: 6.7CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-732 Incorrect Permission Assignment for Critical Resource

Product status

Default status
unaffected

Any version
affected

Credits

Nitesh Surana (niteshsurana.com) - Trend Micro Zero Day Initiative finder

Amol Dosanjh - Trend Micro Research finder

References

docs.docker.com/security/ vendor-advisory

www.zerodayinitiative.com/advisories/ZDI-CAN-28542/ third-party-advisory

www.zerodayinitiative.com/advisories/ZDI-CAN-28190/ third-party-advisory

cve.org (CVE-2025-14740)

nvd.nist.gov (CVE-2025-14740)

Download JSON