CVE-2025-14740: CWE-732 Incorrect Permission Assignment for Critical Resource in Docker Inc. Docker Desktop
Docker Desktop for Windows contains multiple incorrect permission assignment vulnerabilities in the installer's handling of the C:\ProgramData\DockerDesktop directory. The installer creates this directory without proper ownership verification, creating two exploitation scenarios: Scenario 1 (Persistent Attack): If a low-privileged attacker pre-creates C:\ProgramData\DockerDesktop before Docker Desktop installation, the attacker retains ownership of the directory even after the installer applies restrictive ACLs. At any time after installation completes, the attacker can modify the directory ACL (as the owner) and tamper with critical configuration files such as install-settings.json to specify a malicious credentialHelper, causing arbitrary code execution when any user runs Docker Desktop. Scenario 2 (TOCTOU Attack): During installation, there is a time-of-check-time-of-use (TOCTOU) race condition between when the installer creates C:\ProgramData\DockerDesktop and when it sets secure ACLs. A low-privileged attacker actively monitoring for the installation can inject malicious files (such as install-settings.json) with attacker-controlled ACLs during this window, achieving the same code execution outcome.
AI Analysis
Technical Summary
CVE-2025-14740 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting Docker Desktop for Windows. The issue arises from the installer's improper handling of the C:\ProgramData\DockerDesktop directory permissions. Specifically, the installer creates this directory without verifying or properly setting ownership and access control lists (ACLs). Two main exploitation scenarios are described: First, a persistent attack where a low-privileged attacker pre-creates the directory before installation. Because the installer does not change ownership, the attacker remains the owner even after restrictive ACLs are applied. This ownership allows the attacker to modify directory ACLs later and tamper with critical configuration files such as install-settings.json. By altering this file to specify a malicious credentialHelper, the attacker can achieve arbitrary code execution when any user runs Docker Desktop. Second, a time-of-check-time-of-use (TOCTOU) race condition during installation allows an attacker actively monitoring the process to inject malicious files with attacker-controlled ACLs between the directory creation and the setting of secure ACLs. This also leads to arbitrary code execution. The vulnerability requires local low-privileged access and user interaction (installation execution). The CVSS 3.1 base score is 6.7 (medium severity), reflecting high impact on confidentiality, integrity, and availability but with limited attack vector (local) and higher attack complexity. No patches or known exploits in the wild are currently reported. This vulnerability highlights the risks of improper permission management during software installation, especially for critical system directories.
Potential Impact
The vulnerability allows a low-privileged local attacker to gain persistent arbitrary code execution with elevated privileges on Windows systems running Docker Desktop. This compromises confidentiality by potentially exposing sensitive configuration and credential data, integrity by allowing tampering with Docker Desktop configurations and execution flow, and availability by enabling malicious code that could disrupt Docker Desktop or the host system. Organizations relying on Docker Desktop for container management and development face risks of system compromise, lateral movement, and persistence by attackers exploiting this flaw. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints are at risk. The ability to maintain ownership of a critical directory post-installation or exploit a TOCTOU race condition increases the attack surface during software deployment and updates. This can lead to supply chain style attacks where malicious code is injected during installation, undermining trust in Docker Desktop deployments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Restrict local user permissions to prevent unprivileged users from pre-creating or modifying the C:\ProgramData\DockerDesktop directory prior to installation. 2) Perform Docker Desktop installations only from trusted administrators or automated processes with controlled environments to avoid TOCTOU race conditions. 3) Monitor and audit ownership and ACLs of critical directories like C:\ProgramData\DockerDesktop before and after installation to detect unauthorized changes. 4) Use application whitelisting and endpoint protection to detect and block unauthorized modifications to install-settings.json or other configuration files. 5) Consider deploying Docker Desktop in environments with minimal local user access or via containerized or virtualized setups to reduce attack surface. 6) Stay alert for official patches or updates from Docker Inc. addressing this issue and apply them promptly when available. 7) Educate users and administrators about the risks of running installers with elevated privileges in untrusted contexts. These steps go beyond generic advice by focusing on controlling directory ownership, preventing race conditions during installation, and monitoring critical configuration files.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Sweden
CVE-2025-14740: CWE-732 Incorrect Permission Assignment for Critical Resource in Docker Inc. Docker Desktop
Description
Docker Desktop for Windows contains multiple incorrect permission assignment vulnerabilities in the installer's handling of the C:\ProgramData\DockerDesktop directory. The installer creates this directory without proper ownership verification, creating two exploitation scenarios: Scenario 1 (Persistent Attack): If a low-privileged attacker pre-creates C:\ProgramData\DockerDesktop before Docker Desktop installation, the attacker retains ownership of the directory even after the installer applies restrictive ACLs. At any time after installation completes, the attacker can modify the directory ACL (as the owner) and tamper with critical configuration files such as install-settings.json to specify a malicious credentialHelper, causing arbitrary code execution when any user runs Docker Desktop. Scenario 2 (TOCTOU Attack): During installation, there is a time-of-check-time-of-use (TOCTOU) race condition between when the installer creates C:\ProgramData\DockerDesktop and when it sets secure ACLs. A low-privileged attacker actively monitoring for the installation can inject malicious files (such as install-settings.json) with attacker-controlled ACLs during this window, achieving the same code execution outcome.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14740 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting Docker Desktop for Windows. The issue arises from the installer's improper handling of the C:\ProgramData\DockerDesktop directory permissions. Specifically, the installer creates this directory without verifying or properly setting ownership and access control lists (ACLs). Two main exploitation scenarios are described: First, a persistent attack where a low-privileged attacker pre-creates the directory before installation. Because the installer does not change ownership, the attacker remains the owner even after restrictive ACLs are applied. This ownership allows the attacker to modify directory ACLs later and tamper with critical configuration files such as install-settings.json. By altering this file to specify a malicious credentialHelper, the attacker can achieve arbitrary code execution when any user runs Docker Desktop. Second, a time-of-check-time-of-use (TOCTOU) race condition during installation allows an attacker actively monitoring the process to inject malicious files with attacker-controlled ACLs between the directory creation and the setting of secure ACLs. This also leads to arbitrary code execution. The vulnerability requires local low-privileged access and user interaction (installation execution). The CVSS 3.1 base score is 6.7 (medium severity), reflecting high impact on confidentiality, integrity, and availability but with limited attack vector (local) and higher attack complexity. No patches or known exploits in the wild are currently reported. This vulnerability highlights the risks of improper permission management during software installation, especially for critical system directories.
Potential Impact
The vulnerability allows a low-privileged local attacker to gain persistent arbitrary code execution with elevated privileges on Windows systems running Docker Desktop. This compromises confidentiality by potentially exposing sensitive configuration and credential data, integrity by allowing tampering with Docker Desktop configurations and execution flow, and availability by enabling malicious code that could disrupt Docker Desktop or the host system. Organizations relying on Docker Desktop for container management and development face risks of system compromise, lateral movement, and persistence by attackers exploiting this flaw. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints are at risk. The ability to maintain ownership of a critical directory post-installation or exploit a TOCTOU race condition increases the attack surface during software deployment and updates. This can lead to supply chain style attacks where malicious code is injected during installation, undermining trust in Docker Desktop deployments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Restrict local user permissions to prevent unprivileged users from pre-creating or modifying the C:\ProgramData\DockerDesktop directory prior to installation. 2) Perform Docker Desktop installations only from trusted administrators or automated processes with controlled environments to avoid TOCTOU race conditions. 3) Monitor and audit ownership and ACLs of critical directories like C:\ProgramData\DockerDesktop before and after installation to detect unauthorized changes. 4) Use application whitelisting and endpoint protection to detect and block unauthorized modifications to install-settings.json or other configuration files. 5) Consider deploying Docker Desktop in environments with minimal local user access or via containerized or virtualized setups to reduce attack surface. 6) Stay alert for official patches or updates from Docker Inc. addressing this issue and apply them promptly when available. 7) Educate users and administrators about the risks of running installers with elevated privileges in untrusted contexts. These steps go beyond generic advice by focusing on controlling directory ownership, preventing race conditions during installation, and monitoring critical configuration files.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Docker
- Date Reserved
- 2025-12-15T18:58:24.043Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6983546df9fa50a62f8ff386
Added to database: 2/4/2026, 2:15:09 PM
Last enriched: 2/27/2026, 7:10:39 AM
Last updated: 3/24/2026, 12:19:00 AM
Views: 140
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.