Wiz Agents & Workflows are here

CVE-2025-14740
Docker Desktop vulnerability analysis and mitigation

Docker Desktop for Windows contains multiple incorrect permission assignment vulnerabilities in the installer's handling of the C:\ProgramData\DockerDesktop directory. The installer creates this directory without proper ownership verification, creating two exploitation scenarios:

Scenario 1 (Persistent Attack): If a low-privileged attacker pre-creates C:\ProgramData\DockerDesktop before Docker Desktop installation, the attacker retains ownership of the directory even after the installer applies restrictive ACLs. At any time after installation completes, the attacker can modify the directory ACL (as the owner) and tamper with critical configuration files such as install-settings.json to specify a malicious credentialHelper, causing arbitrary code execution when any user runs Docker Desktop.

Scenario 2 (TOCTOU Attack): During installation, there is a time-of-check-time-of-use (TOCTOU) race condition between when the installer creates C:\ProgramData\DockerDesktop and when it sets secure ACLs. A low-privileged attacker actively monitoring for the installation can inject malicious files (such as install-settings.json) with attacker-controlled ACLs during this window, achieving the same code execution outcome.


SourceNVD

Related Docker Desktop vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-9164HIGH8.8
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:docker_desktop
NoNoOct 27, 2025
CVE-2025-10657HIGH8.7
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:desktop
NoNoSep 26, 2025
CVE-2026-2664MEDIUM6.8
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:desktop
NoYesFeb 24, 2026
CVE-2025-14740MEDIUM6.7
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:desktop
NoNoFeb 04, 2026
CVE-2025-13743LOW2.4
  • Docker DesktopDocker Desktop
  • cpe:2.3:a:docker:docker_desktop
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management