CVE-2026-28400: CWE-749: Exposed Dangerous Method or Function in docker model-runner
Docker Model Runner (DMR) is software used to manage, run, and deploy AI models using Docker. Versions prior to 1.0.16 expose a POST `/engines/_configure` endpoint that accepts arbitrary runtime flags without authentication. These flags are passed directly to the underlying inference server (llama.cpp). By injecting the --log-file flag, an attacker with network access to the Model Runner API can write or overwrite arbitrary files accessible to the Model Runner process. When bundled with Docker Desktop (where Model Runner is enabled by default since version 4.46.0), it is reachable from any default container at model-runner.docker.internal without authentication. In this context, the file overwrite can target the Docker Desktop VM disk (`Docker.raw` ), resulting in the destruction of all containers, images, volumes, and build history. However, in specific configurations and with user interaction, it is possible to convert this vulnerability in a container escape. The issue is fixed in Docker Model Runner 1.0.16. Docker Desktop users should update to 4.61.0 or later, which includes the fixed Model Runner. A workaround is available. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable.
AI Analysis
Technical Summary
Docker Model Runner (DMR) is a component used to manage and deploy AI models within Docker environments. Versions before 1.0.16 contain a critical vulnerability (CVE-2026-28400) due to an exposed POST /engines/_configure API endpoint that accepts arbitrary runtime flags without requiring authentication. These flags are passed directly to the underlying inference server (llama.cpp). An attacker with network access to this API can inject the --log-file flag to write or overwrite arbitrary files accessible to the Model Runner process. When Docker Model Runner is bundled with Docker Desktop (enabled by default since version 4.46.0), this endpoint is reachable from any default container via model-runner.docker.internal without authentication. This allows an attacker to overwrite the Docker Desktop VM disk file (Docker.raw), which stores all containers, images, volumes, and build history, effectively destroying the Docker environment. Furthermore, under specific configurations and with user interaction, this vulnerability can be leveraged for container escape, allowing an attacker to break out of container isolation. The issue is resolved in Docker Model Runner 1.0.16 and Docker Desktop 4.61.0 or later, which include the patched Model Runner. As a mitigation, enabling Enhanced Container Isolation (ECI) prevents containers from accessing Model Runner, blocking exploitation. However, if Model Runner is exposed over localhost TCP in certain setups, the vulnerability remains exploitable. The CVSS v3.1 score is 7.6, reflecting high severity due to the potential for complete compromise of Docker environments, requiring low privileges but some user interaction and network access.
Potential Impact
This vulnerability poses a significant risk to organizations using Docker Desktop with Model Runner enabled, particularly versions prior to 4.61.0. Exploitation can lead to arbitrary file overwrite, resulting in destruction of all Docker containers, images, volumes, and build history, causing severe availability and integrity impacts. Confidentiality is also at risk if attackers can modify or inject malicious files. The potential for container escape in certain configurations elevates the threat, as attackers could gain unauthorized access to the host system, compromising broader infrastructure. This can disrupt development, CI/CD pipelines, and production environments relying on containerized AI workloads. Organizations may face operational downtime, data loss, and increased attack surface for further exploitation. The requirement for network access and some user interaction limits remote exploitation but does not eliminate risk, especially in multi-tenant or developer environments. The vulnerability affects both individual developers and enterprises using Docker Desktop and AI model deployments, making it critical to address promptly.
Mitigation Recommendations
1. Immediately update Docker Model Runner to version 1.0.16 or later and Docker Desktop to version 4.61.0 or newer to obtain the official patch. 2. Enable Enhanced Container Isolation (ECI) in Docker Desktop to block container access to the Model Runner service, preventing exploitation even if the vulnerability exists. 3. Audit and restrict network access to the Model Runner API endpoint, especially blocking exposure over localhost TCP or any network interfaces accessible by untrusted containers or users. 4. Implement strict network segmentation and firewall rules to limit access to Docker internal services. 5. Monitor Docker environments for unusual POST requests to /engines/_configure or unexpected file modifications related to Model Runner. 6. Educate users about the risks of interacting with untrusted containers or services that might exploit this vulnerability. 7. For environments where immediate patching is not possible, consider disabling Model Runner if feasible or isolating Docker Desktop usage to trusted networks only. 8. Regularly review container and host logs for signs of exploitation attempts or anomalous behavior related to file overwrites or container escapes.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, India, Canada, Australia
CVE-2026-28400: CWE-749: Exposed Dangerous Method or Function in docker model-runner
Description
Docker Model Runner (DMR) is software used to manage, run, and deploy AI models using Docker. Versions prior to 1.0.16 expose a POST `/engines/_configure` endpoint that accepts arbitrary runtime flags without authentication. These flags are passed directly to the underlying inference server (llama.cpp). By injecting the --log-file flag, an attacker with network access to the Model Runner API can write or overwrite arbitrary files accessible to the Model Runner process. When bundled with Docker Desktop (where Model Runner is enabled by default since version 4.46.0), it is reachable from any default container at model-runner.docker.internal without authentication. In this context, the file overwrite can target the Docker Desktop VM disk (`Docker.raw` ), resulting in the destruction of all containers, images, volumes, and build history. However, in specific configurations and with user interaction, it is possible to convert this vulnerability in a container escape. The issue is fixed in Docker Model Runner 1.0.16. Docker Desktop users should update to 4.61.0 or later, which includes the fixed Model Runner. A workaround is available. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable.
AI-Powered Analysis
Technical Analysis
Docker Model Runner (DMR) is a component used to manage and deploy AI models within Docker environments. Versions before 1.0.16 contain a critical vulnerability (CVE-2026-28400) due to an exposed POST /engines/_configure API endpoint that accepts arbitrary runtime flags without requiring authentication. These flags are passed directly to the underlying inference server (llama.cpp). An attacker with network access to this API can inject the --log-file flag to write or overwrite arbitrary files accessible to the Model Runner process. When Docker Model Runner is bundled with Docker Desktop (enabled by default since version 4.46.0), this endpoint is reachable from any default container via model-runner.docker.internal without authentication. This allows an attacker to overwrite the Docker Desktop VM disk file (Docker.raw), which stores all containers, images, volumes, and build history, effectively destroying the Docker environment. Furthermore, under specific configurations and with user interaction, this vulnerability can be leveraged for container escape, allowing an attacker to break out of container isolation. The issue is resolved in Docker Model Runner 1.0.16 and Docker Desktop 4.61.0 or later, which include the patched Model Runner. As a mitigation, enabling Enhanced Container Isolation (ECI) prevents containers from accessing Model Runner, blocking exploitation. However, if Model Runner is exposed over localhost TCP in certain setups, the vulnerability remains exploitable. The CVSS v3.1 score is 7.6, reflecting high severity due to the potential for complete compromise of Docker environments, requiring low privileges but some user interaction and network access.
Potential Impact
This vulnerability poses a significant risk to organizations using Docker Desktop with Model Runner enabled, particularly versions prior to 4.61.0. Exploitation can lead to arbitrary file overwrite, resulting in destruction of all Docker containers, images, volumes, and build history, causing severe availability and integrity impacts. Confidentiality is also at risk if attackers can modify or inject malicious files. The potential for container escape in certain configurations elevates the threat, as attackers could gain unauthorized access to the host system, compromising broader infrastructure. This can disrupt development, CI/CD pipelines, and production environments relying on containerized AI workloads. Organizations may face operational downtime, data loss, and increased attack surface for further exploitation. The requirement for network access and some user interaction limits remote exploitation but does not eliminate risk, especially in multi-tenant or developer environments. The vulnerability affects both individual developers and enterprises using Docker Desktop and AI model deployments, making it critical to address promptly.
Mitigation Recommendations
1. Immediately update Docker Model Runner to version 1.0.16 or later and Docker Desktop to version 4.61.0 or newer to obtain the official patch. 2. Enable Enhanced Container Isolation (ECI) in Docker Desktop to block container access to the Model Runner service, preventing exploitation even if the vulnerability exists. 3. Audit and restrict network access to the Model Runner API endpoint, especially blocking exposure over localhost TCP or any network interfaces accessible by untrusted containers or users. 4. Implement strict network segmentation and firewall rules to limit access to Docker internal services. 5. Monitor Docker environments for unusual POST requests to /engines/_configure or unexpected file modifications related to Model Runner. 6. Educate users about the risks of interacting with untrusted containers or services that might exploit this vulnerability. 7. For environments where immediate patching is not possible, consider disabling Model Runner if feasible or isolating Docker Desktop usage to trusted networks only. 8. Regularly review container and host logs for signs of exploitation attempts or anomalous behavior related to file overwrites or container escapes.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-27T15:33:57.288Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a20bf332ffcdb8a2748332
Added to database: 2/27/2026, 9:26:11 PM
Last enriched: 2/27/2026, 9:40:43 PM
Last updated: 2/27/2026, 11:36:44 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28426: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
HighCVE-2025-11252: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Signum Technology Promotion and Training Inc. windesk.fm
CriticalCVE-2026-2647
UnknownCVE-2026-28425: CWE-94: Improper Control of Generation of Code ('Code Injection') in statamic cms
HighCVE-2026-28424: CWE-862: Missing Authorization in statamic cms
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.