Saturday, May 24, 2025
HomeCVE/vulnerabilityDocker Registry Vulnerability Lets macOS Users Access Any Registry Without Authorization

Docker Registry Vulnerability Lets macOS Users Access Any Registry Without Authorization

Published on

SIEM as a Service

Follow Us on Google News

A recently discovered vulnerability in Docker Desktop for macOS is raising concerns in the developer and security communities.

The flaw, which stems from the improper application of Registry Access Management (RAM) policies under certain conditions, could allow unauthorized access to potentially malicious container images-putting organizations at risk of supply chain attacks.

Vulnerability Details

When organizations enforce sign-in via a macOS configuration profile, Docker Desktop fails to apply the intended RAM policies that control which registries users can access.

- Advertisement - Google News

As a result, developers using affected versions on macOS can bypass restrictions and pull images from any Docker registry-including those not approved or vetted by the organization.

As per a report by CVE, the issue has been assigned a CVSS 4.0 base score of 4.3 (Medium severity), indicating potential for business disruption and increased attack surfaces, particularly in environments where Docker is integral to software development lifecycles.

FieldData
CVE IDCVE-2025-4095
Vulnerability NameDocker Registry Flaw Lets macOS Users Access Any Registry Without Authorization
CWECWE-862: Missing Authorization
CVSS Score4.3 (Medium)
Affected ProductDocker Desktop
PlatformmacOS
Affected VersionsFrom 4.36.0 before 4.41.0

Docker Registry Access Management (RAM) is designed to empower administrators with the ability to limit Docker Desktop users to specific, organization-approved registries.

However, with sign-in enforcement managed via macOS configuration profiles, this critical safeguard is rendered ineffective.

As a consequence, users may inadvertently (or intentionally) download untrusted images containing malware, ransomware, or backdoors.

While the issue requires a local authenticated user (local attack vector), the potential impact is significant for organizations relying on Docker Desktop as part of their DevOps pipelines.

Attackers exploiting this flaw could introduce compromised containers into the software supply chain, undermining application security and compliance mandates.

  • Upgrade to Docker Desktop 4.41.0 or later where this issue has been addressed.
  • Regularly audit Docker Desktop settings and registry policies.
  • Monitor for unapproved container images in development and production environments.
  • Educate development teams about the importance of pulling images only from trusted sources.

Docker has released patches and encourages all macOS users to update promptly, ensuring that organizational security controls are effectively enforced.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...