Docker Desktop Model Runner SSRF Vulnerability Advisory
Summary
CERT-Bund issued a security advisory regarding a Server-Side Request Forgery (SSRF) vulnerability in Docker Desktop Model Runner (versions prior to 1.1.25) and Docker Desktop (versions prior to 4.67.0). The vulnerability carries a CVSS Base Score of 7.4 (high) and allows remote anonymous attackers to disclose confidential information.
What changed
CERT-Bund published advisory WID-SEC-2026-0922 disclosing an SSRF vulnerability in Docker Desktop Model Runner and Docker Desktop affecting Windows, UNIX, and other operating systems. The vulnerability enables remote, anonymous attackers to perform Server-Side Request Forgery attacks and access sensitive information.
Organizations running affected Docker products should immediately update to Docker Desktop Model Runner version 1.1.25 or later, or Docker Desktop version 4.67.0 or later. Where immediate patching is not feasible, mitigation measures should be applied and systems should be monitored for signs of exploitation.
What to do next
- Identify all Docker Desktop Model Runner installations and verify version numbers
- Update Docker Desktop Model Runner to version 1.1.25 or later, or Docker Desktop to version 4.67.0 or later
- Review systems for indicators of compromise consistent with SSRF exploitation
Source document (simplified)
[WID-SEC-2026-0922] Docker Desktop Model Runner: Schwachstelle ermöglicht Offenlegung von Informationen CVSS Base Score 7.4 (hoch) CVSS Temporal Score 6.4 (mittel) Remoteangriff ja Datum 30.03.2026 Stand 31.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Docker Desktop ist ein GUI-Tool rund um die Open-Source-Docker-Engine, mit dem sich containerisierte Anwendungen auf einem lokalen Rechner erstellen, teilen und ausführen lassen.
Produkte
30.03.2026
- Docker Desktop Model Runner <1.1.25
- Docker Desktop <4.67.0
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Docker Desktop Model Runner ausnutzen, um Server-Side Request Forgery (SSRF) durchzuführen und vertrauliche Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.