CVE-2025-4095: CWE-862 Missing Authorization in Docker Docker Desktop
Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry.
AI Analysis
Technical Summary
CVE-2025-4095 is a medium-severity vulnerability identified in Docker Desktop version 4.36.0, specifically related to the Registry Access Management (RAM) feature on macOS systems. RAM is designed to allow administrators to restrict developers' access to only approved container image registries, thereby preventing the use of unapproved or potentially malicious container images. However, when an organization enforces sign-in via a macOS configuration profile, the RAM policies fail to apply correctly. This missing authorization (CWE-862) flaw means that Docker Desktop users can bypass these restrictions and pull container images from any registry, including unapproved or malicious sources. The vulnerability does not require user interaction and can be exploited with low attack complexity by an attacker with limited privileges (low privileges but some authentication required). The scope is high since the vulnerability affects the authorization mechanism, potentially impacting multiple users within an organization. The vulnerability does not impact confidentiality, integrity, or availability directly but poses a significant risk by allowing unauthorized image downloads, which could lead to the introduction of malicious code or supply chain compromise within containerized environments. No known exploits are currently reported in the wild, and no patches have been published yet as of the vulnerability disclosure date (April 29, 2025).
Potential Impact
For European organizations, especially those relying heavily on containerized applications and Docker Desktop on macOS, this vulnerability presents a risk of supply chain compromise. Attackers or malicious insiders could exploit this flaw to introduce unapproved and potentially malicious container images into development or production environments. This could lead to the execution of malicious code, data breaches, or lateral movement within networks. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) could face regulatory and reputational damage if compromised images lead to security incidents. The impact is heightened in environments where macOS is prevalent among developers or DevOps teams and where strict registry access policies are critical for maintaining security posture. Since the vulnerability allows bypassing of authorization controls, it undermines organizational governance and increases the attack surface for supply chain attacks, which are a growing concern in Europe. However, the vulnerability does not directly cause system outages or data loss but acts as an enabler for further attacks.
Mitigation Recommendations
Until an official patch is released, organizations should consider temporarily disabling the use of macOS configuration profiles that enforce organization sign-in for Docker Desktop users or avoid enforcing RAM policies via these profiles. Implement network-level controls to restrict access to container registries, ensuring that only approved registries are reachable from developer and build environments, effectively compensating for the authorization bypass. Use container image scanning and runtime security tools to detect and block unapproved or malicious images regardless of the source registry. Enforce strict access controls and monitoring on Docker Desktop usage, including auditing image pulls and container deployments to detect anomalous activity. Educate developers and DevOps teams about the risk of pulling images from unapproved registries and encourage the use of signed and verified images. Consider using alternative container management tools or orchestrators that enforce registry access policies more robustly on macOS until this vulnerability is addressed. Monitor Docker and vendor advisories closely for patches or updates addressing this vulnerability and prioritize timely deployment once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2025-4095: CWE-862 Missing Authorization in Docker Docker Desktop
Description
Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry.
AI-Powered Analysis
Technical Analysis
CVE-2025-4095 is a medium-severity vulnerability identified in Docker Desktop version 4.36.0, specifically related to the Registry Access Management (RAM) feature on macOS systems. RAM is designed to allow administrators to restrict developers' access to only approved container image registries, thereby preventing the use of unapproved or potentially malicious container images. However, when an organization enforces sign-in via a macOS configuration profile, the RAM policies fail to apply correctly. This missing authorization (CWE-862) flaw means that Docker Desktop users can bypass these restrictions and pull container images from any registry, including unapproved or malicious sources. The vulnerability does not require user interaction and can be exploited with low attack complexity by an attacker with limited privileges (low privileges but some authentication required). The scope is high since the vulnerability affects the authorization mechanism, potentially impacting multiple users within an organization. The vulnerability does not impact confidentiality, integrity, or availability directly but poses a significant risk by allowing unauthorized image downloads, which could lead to the introduction of malicious code or supply chain compromise within containerized environments. No known exploits are currently reported in the wild, and no patches have been published yet as of the vulnerability disclosure date (April 29, 2025).
Potential Impact
For European organizations, especially those relying heavily on containerized applications and Docker Desktop on macOS, this vulnerability presents a risk of supply chain compromise. Attackers or malicious insiders could exploit this flaw to introduce unapproved and potentially malicious container images into development or production environments. This could lead to the execution of malicious code, data breaches, or lateral movement within networks. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) could face regulatory and reputational damage if compromised images lead to security incidents. The impact is heightened in environments where macOS is prevalent among developers or DevOps teams and where strict registry access policies are critical for maintaining security posture. Since the vulnerability allows bypassing of authorization controls, it undermines organizational governance and increases the attack surface for supply chain attacks, which are a growing concern in Europe. However, the vulnerability does not directly cause system outages or data loss but acts as an enabler for further attacks.
Mitigation Recommendations
Until an official patch is released, organizations should consider temporarily disabling the use of macOS configuration profiles that enforce organization sign-in for Docker Desktop users or avoid enforcing RAM policies via these profiles. Implement network-level controls to restrict access to container registries, ensuring that only approved registries are reachable from developer and build environments, effectively compensating for the authorization bypass. Use container image scanning and runtime security tools to detect and block unapproved or malicious images regardless of the source registry. Enforce strict access controls and monitoring on Docker Desktop usage, including auditing image pulls and container deployments to detect anomalous activity. Educate developers and DevOps teams about the risk of pulling images from unapproved registries and encourage the use of signed and verified images. Consider using alternative container management tools or orchestrators that enforce registry access policies more robustly on macOS until this vulnerability is addressed. Monitor Docker and vendor advisories closely for patches or updates addressing this vulnerability and prioritize timely deployment once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Docker
- Date Reserved
- 2025-04-29T14:22:36.344Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee97e
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 2:05:58 AM
Last updated: 7/26/2025, 1:29:21 AM
Views: 11
Related Threats
CVE-2025-8533: CWE-863 Incorrect Authorization in Flexibits Fantastical
MediumCVE-2025-35970: Use of weak credentials in SEIKO EPSON Multiple EPSON product
HighCVE-2025-29866: CWE-73: External Control of File Name or Path in TAGFREE X-Free Uploader
HighCVE-2025-32094: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Akamai AkamaiGhost
MediumCVE-2025-8583: Inappropriate implementation in Google Chrome
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.