Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14740: CWE-732 Incorrect Permission Assignment for Critical Resource in Docker Inc. Docker Desktop

0
Medium
VulnerabilityCVE-2025-14740cvecve-2025-14740cwe-732
Published: Wed Feb 04 2026 (02/04/2026, 13:57:23 UTC)
Source: CVE Database V5
Vendor/Project: Docker Inc.
Product: Docker Desktop

Description

Docker Desktop for Windows contains multiple incorrect permission assignment vulnerabilities in the installer's handling of the C:\ProgramData\DockerDesktop directory. The installer creates this directory without proper ownership verification, creating two exploitation scenarios: Scenario 1 (Persistent Attack): If a low-privileged attacker pre-creates C:\ProgramData\DockerDesktop before Docker Desktop installation, the attacker retains ownership of the directory even after the installer applies restrictive ACLs. At any time after installation completes, the attacker can modify the directory ACL (as the owner) and tamper with critical configuration files such as install-settings.json to specify a malicious credentialHelper, causing arbitrary code execution when any user runs Docker Desktop. Scenario 2 (TOCTOU Attack): During installation, there is a time-of-check-time-of-use (TOCTOU) race condition between when the installer creates C:\ProgramData\DockerDesktop and when it sets secure ACLs. A low-privileged attacker actively monitoring for the installation can inject malicious files (such as install-settings.json) with attacker-controlled ACLs during this window, achieving the same code execution outcome.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:10:39 UTC

Technical Analysis

CVE-2025-14740 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting Docker Desktop for Windows. The issue arises from the installer's improper handling of the C:\ProgramData\DockerDesktop directory permissions. Specifically, the installer creates this directory without verifying or properly setting ownership and access control lists (ACLs). Two main exploitation scenarios are described: First, a persistent attack where a low-privileged attacker pre-creates the directory before installation. Because the installer does not change ownership, the attacker remains the owner even after restrictive ACLs are applied. This ownership allows the attacker to modify directory ACLs later and tamper with critical configuration files such as install-settings.json. By altering this file to specify a malicious credentialHelper, the attacker can achieve arbitrary code execution when any user runs Docker Desktop. Second, a time-of-check-time-of-use (TOCTOU) race condition during installation allows an attacker actively monitoring the process to inject malicious files with attacker-controlled ACLs between the directory creation and the setting of secure ACLs. This also leads to arbitrary code execution. The vulnerability requires local low-privileged access and user interaction (installation execution). The CVSS 3.1 base score is 6.7 (medium severity), reflecting high impact on confidentiality, integrity, and availability but with limited attack vector (local) and higher attack complexity. No patches or known exploits in the wild are currently reported. This vulnerability highlights the risks of improper permission management during software installation, especially for critical system directories.

Potential Impact

The vulnerability allows a low-privileged local attacker to gain persistent arbitrary code execution with elevated privileges on Windows systems running Docker Desktop. This compromises confidentiality by potentially exposing sensitive configuration and credential data, integrity by allowing tampering with Docker Desktop configurations and execution flow, and availability by enabling malicious code that could disrupt Docker Desktop or the host system. Organizations relying on Docker Desktop for container management and development face risks of system compromise, lateral movement, and persistence by attackers exploiting this flaw. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints are at risk. The ability to maintain ownership of a critical directory post-installation or exploit a TOCTOU race condition increases the attack surface during software deployment and updates. This can lead to supply chain style attacks where malicious code is injected during installation, undermining trust in Docker Desktop deployments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Restrict local user permissions to prevent unprivileged users from pre-creating or modifying the C:\ProgramData\DockerDesktop directory prior to installation. 2) Perform Docker Desktop installations only from trusted administrators or automated processes with controlled environments to avoid TOCTOU race conditions. 3) Monitor and audit ownership and ACLs of critical directories like C:\ProgramData\DockerDesktop before and after installation to detect unauthorized changes. 4) Use application whitelisting and endpoint protection to detect and block unauthorized modifications to install-settings.json or other configuration files. 5) Consider deploying Docker Desktop in environments with minimal local user access or via containerized or virtualized setups to reduce attack surface. 6) Stay alert for official patches or updates from Docker Inc. addressing this issue and apply them promptly when available. 7) Educate users and administrators about the risks of running installers with elevated privileges in untrusted contexts. These steps go beyond generic advice by focusing on controlling directory ownership, preventing race conditions during installation, and monitoring critical configuration files.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Docker
Date Reserved
2025-12-15T18:58:24.043Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983546df9fa50a62f8ff386

Added to database: 2/4/2026, 2:15:09 PM

Last enriched: 2/27/2026, 7:10:39 AM

Last updated: 3/24/2026, 12:19:00 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses