Skip to main content

CVE-2025-4095: CWE-862 Missing Authorization in Docker Docker Desktop

Medium
VulnerabilityCVE-2025-4095cvecve-2025-4095cwe-862
Published: Tue Apr 29 2025 (04/29/2025, 17:16:16 UTC)
Source: CVE
Vendor/Project: Docker
Product: Docker Desktop

Description

Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry.

AI-Powered Analysis

AILast updated: 06/25/2025, 02:05:58 UTC

Technical Analysis

CVE-2025-4095 is a medium-severity vulnerability identified in Docker Desktop version 4.36.0, specifically related to the Registry Access Management (RAM) feature on macOS systems. RAM is designed to allow administrators to restrict developers' access to only approved container image registries, thereby preventing the use of unapproved or potentially malicious container images. However, when an organization enforces sign-in via a macOS configuration profile, the RAM policies fail to apply correctly. This missing authorization (CWE-862) flaw means that Docker Desktop users can bypass these restrictions and pull container images from any registry, including unapproved or malicious sources. The vulnerability does not require user interaction and can be exploited with low attack complexity by an attacker with limited privileges (low privileges but some authentication required). The scope is high since the vulnerability affects the authorization mechanism, potentially impacting multiple users within an organization. The vulnerability does not impact confidentiality, integrity, or availability directly but poses a significant risk by allowing unauthorized image downloads, which could lead to the introduction of malicious code or supply chain compromise within containerized environments. No known exploits are currently reported in the wild, and no patches have been published yet as of the vulnerability disclosure date (April 29, 2025).

Potential Impact

For European organizations, especially those relying heavily on containerized applications and Docker Desktop on macOS, this vulnerability presents a risk of supply chain compromise. Attackers or malicious insiders could exploit this flaw to introduce unapproved and potentially malicious container images into development or production environments. This could lead to the execution of malicious code, data breaches, or lateral movement within networks. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) could face regulatory and reputational damage if compromised images lead to security incidents. The impact is heightened in environments where macOS is prevalent among developers or DevOps teams and where strict registry access policies are critical for maintaining security posture. Since the vulnerability allows bypassing of authorization controls, it undermines organizational governance and increases the attack surface for supply chain attacks, which are a growing concern in Europe. However, the vulnerability does not directly cause system outages or data loss but acts as an enabler for further attacks.

Mitigation Recommendations

Until an official patch is released, organizations should consider temporarily disabling the use of macOS configuration profiles that enforce organization sign-in for Docker Desktop users or avoid enforcing RAM policies via these profiles. Implement network-level controls to restrict access to container registries, ensuring that only approved registries are reachable from developer and build environments, effectively compensating for the authorization bypass. Use container image scanning and runtime security tools to detect and block unapproved or malicious images regardless of the source registry. Enforce strict access controls and monitoring on Docker Desktop usage, including auditing image pulls and container deployments to detect anomalous activity. Educate developers and DevOps teams about the risk of pulling images from unapproved registries and encourage the use of signed and verified images. Consider using alternative container management tools or orchestrators that enforce registry access policies more robustly on macOS until this vulnerability is addressed. Monitor Docker and vendor advisories closely for patches or updates addressing this vulnerability and prioritize timely deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Docker
Date Reserved
2025-04-29T14:22:36.344Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee97e

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 2:05:58 AM

Last updated: 7/26/2025, 1:29:21 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats