Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-14740
Awaiting Analysis
More InfoOfficial Page
Source-security@docker.com
View Known Exploited Vulnerability (KEV) details
Published At-04 Feb, 2026 | 14:16
Updated At-04 Feb, 2026 | 16:33

Docker Desktop for Windows contains multiple incorrect permission assignment vulnerabilities in the installer's handling of the C:\ProgramData\DockerDesktop directory. The installer creates this directory without proper ownership verification, creating two exploitation scenarios: Scenario 1 (Persistent Attack): If a low-privileged attacker pre-creates C:\ProgramData\DockerDesktop before Docker Desktop installation, the attacker retains ownership of the directory even after the installer applies restrictive ACLs. At any time after installation completes, the attacker can modify the directory ACL (as the owner) and tamper with critical configuration files such as install-settings.json to specify a malicious credentialHelper, causing arbitrary code execution when any user runs Docker Desktop. Scenario 2 (TOCTOU Attack): During installation, there is a time-of-check-time-of-use (TOCTOU) race condition between when the installer creates C:\ProgramData\DockerDesktop and when it sets secure ACLs. A low-privileged attacker actively monitoring for the installation can inject malicious files (such as install-settings.json) with attacker-controlled ACLs during this window, achieving the same code execution outcome.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-732Secondarysecurity@docker.com
CWE ID: CWE-732
Type: Secondary
Source: security@docker.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.docker.com/security/security@docker.com
N/A
https://www.zerodayinitiative.com/advisories/ZDI-CAN-28190/security@docker.com
N/A
https://www.zerodayinitiative.com/advisories/ZDI-CAN-28542/security@docker.com
N/A
Hyperlink: https://docs.docker.com/security/
Source: security@docker.com
Resource: N/A
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-CAN-28190/
Source: security@docker.com
Resource: N/A
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-CAN-28542/
Source: security@docker.com
Resource: N/A
Change History
0Changes found

Details not found