Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-14740
PUBLISHED
More InfoOfficial Page
Assigner-Docker
Assigner Org ID-686469e6-3ff6-451b-ab8b-cf5b9e89401e
View Known Exploited Vulnerability (KEV) details
Published At-04 Feb, 2026 | 13:57
Updated At-05 Feb, 2026 | 04:55
Rejected At-
▼CVE Numbering Authority (CNA)
Docker Desktop for Windows Incorrect Permission Assignment Privilege Escalation Vulnerabilities

Docker Desktop for Windows contains multiple incorrect permission assignment vulnerabilities in the installer's handling of the C:\ProgramData\DockerDesktop directory. The installer creates this directory without proper ownership verification, creating two exploitation scenarios: Scenario 1 (Persistent Attack): If a low-privileged attacker pre-creates C:\ProgramData\DockerDesktop before Docker Desktop installation, the attacker retains ownership of the directory even after the installer applies restrictive ACLs. At any time after installation completes, the attacker can modify the directory ACL (as the owner) and tamper with critical configuration files such as install-settings.json to specify a malicious credentialHelper, causing arbitrary code execution when any user runs Docker Desktop. Scenario 2 (TOCTOU Attack): During installation, there is a time-of-check-time-of-use (TOCTOU) race condition between when the installer creates C:\ProgramData\DockerDesktop and when it sets secure ACLs. A low-privileged attacker actively monitoring for the installation can inject malicious files (such as install-settings.json) with attacker-controlled ACLs during this window, achieving the same code execution outcome.

Affected Products
Vendor
Docker, Inc.Docker Inc.
Product
Docker Desktop
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From 0 through 4.56.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-732CWE-732 Incorrect Permission Assignment for Critical Resource
Type: CWE
CWE ID: CWE-732
Description: CWE-732 Incorrect Permission Assignment for Critical Resource
Metrics
VersionBase scoreBase severityVector
3.16.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-1CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC ID: CAPEC-1
Description: CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
Solutions

Docker has implemented the following mitigations: - Atomic creation of C:\ProgramData\DockerDesktop with admin ownership and correct ACLs - Verification that directory is owned by known admin SIDs (SYSTEM or Administrators) - Installation aborts if directory is not owned by trusted elevated SID - TOCTOU protection through atomic operations setting ownership and ACLs simultaneously Update to Docker Desktop version 4.56 or later.

Configurations

Workarounds

Exploits

Credits

finder
Nitesh Surana (niteshsurana.com) - Trend Micro Zero Day Initiative
finder
Amol Dosanjh - Trend Micro Research
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.docker.com/security/
vendor-advisory
https://www.zerodayinitiative.com/advisories/ZDI-CAN-28542/
third-party-advisory
https://www.zerodayinitiative.com/advisories/ZDI-CAN-28190/
third-party-advisory
Hyperlink: https://docs.docker.com/security/
Resource:
vendor-advisory
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-CAN-28542/
Resource:
third-party-advisory
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-CAN-28190/
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found