Docker Desktop Security: Critical Updates & CVE-2026-2664, CVE-2026-2840…

For R&D engineering teams, the pace of innovation often clashes with the critical need for robust security. Today, that tension is acutely felt as recent Docker releases, particularly for Docker Desktop, have brought to light significant vulnerabilities that demand immediate attention. Ignoring these patches could expose your development workstations and potentially your entire containerized ecosystem to severe threats, including privilege escalation and container escape. This isn’t just about updating software; it’s about safeguarding your intellectual property, maintaining development velocity, and upholding your organization’s security posture.

Background Context: A Rapid Release Cycle and Core Updates

Docker Desktop remains the de-facto standard for local container development, providing a seamless experience across Windows, macOS, and Linux. Its tight integration with underlying virtualization technologies and local Kubernetes clusters makes it indispensable for millions of developers. However, this power comes with responsibility. The past few weeks have seen a rapid succession of Docker Desktop releases, including versions 4.62.0, 4.63.0, 4.64.0, and most recently, 4.65.0, released on March 16, 2026. This accelerated cadence is a clear indicator of critical issues being addressed, emphasizing the urgency for engineers to stay current.

In parallel, the foundational Docker Engine itself has seen significant evolution with the release of v29.3.0 on March 5, 2026. This core engine update introduces architectural refinements, enhanced API capabilities, and critical bug fixes that underpin the stability and performance of your container workloads. Understanding both the Desktop and Engine updates is crucial for a holistic security strategy.

Deep Technical Analysis: Unpacking Recent Docker Desktop Vulnerabilities and Updates

Critical Security Patches: CVE-2026-2664 and CVE-2026-28400

The most pressing concerns stem from two recently disclosed CVEs that were addressed in Docker Desktop 4.62.0, released on February 23, 2026, and subsequent versions. These vulnerabilities highlight the persistent need for vigilance in containerized environments.

CVE-2026-2664: Privilege Escalation via grpcfuse Kernel Module

This vulnerability, identified as an out-of-bounds read (CWE-125), resides within Docker Desktop’s grpcfuse kernel module. It affects Docker Desktop versions up to and including 4.61.0. A local attacker could exploit this flaw by writing to specific /proc/docker entries within the Linux VM that powers Docker Desktop on Windows, Linux, and macOS. The impact is severe: it could lead to unspecified system impact, potentially allowing for information disclosure or, more critically, local privilege escalation within the containerized environment. This means an attacker who has gained initial access to a container could potentially break out or elevate their privileges on the host system running Docker Desktop, bypassing the intended isolation boundaries.

The fix for CVE-2026-2664 was included in Docker Desktop version 4.62.0. This underscores why upgrading to the latest version is not merely a recommendation but a critical security imperative.

CVE-2026-28400: Docker Model Runner Runtime Flag Injection

Another significant vulnerability, CVE-2026-28400, targets the Docker Model Runner (DMR), a component designed to manage, run, and deploy AI models using Docker. Versions of DMR prior to 1.0.16 expose an unauthenticated POST /engines/_configure endpoint. This endpoint accepts arbitrary runtime flags, which are then passed directly to the underlying inference server (e.g., llama.cpp).

By injecting the --log-file flag, an attacker with network access to the Model Runner API could achieve arbitrary file write or overwrite capabilities on files accessible to the Model Runner process. When bundled with Docker Desktop (where Model Runner is enabled by default since version 4.46.0), this API is reachable from any default container at model-runner.docker.internal without authentication. In this scenario, the file overwrite could target the Docker Desktop VM disk (Docker.raw), leading to the destruction of all containers, images, volumes, and build history. In specific configurations and with user interaction, this vulnerability could even be converted into a container escape.

The issue is fixed in Docker Model Runner 1.0.16, which is included in Docker Desktop 4.61.0 and later. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) acts as a crucial workaround, as it blocks container access to the Model Runner, thereby preventing exploitation.

Docker Engine v29.3.0: Foundational Enhancements

The Docker Engine v29.3.0 release, dated March 5, 2026, builds upon the foundational changes introduced in the broader v29 series. Key updates include:

  • New bind-create-src option for the --mount flag, enhancing flexibility for bind mounts.
  • CLI plugin hooks now fire on command failure, not just success, providing more granular control for error handling.
  • BuildKit has been updated to v0.28.0, promising improved build performance and security.
  • A critical fix addresses DNS configuration corruption issues during daemon reloads.
  • The minimum API version has been updated, with v1.44 (Moby v25) now being the standard.
  • A significant architectural shift in the v29 series is the adoption of the Containerd image store as the default for new installations, simplifying architecture and improving ecosystem alignment.

Docker Desktop 4.65.0 and Intermediate Releases: Beyond Security

While security fixes are paramount, recent Docker Desktop releases also deliver continuous improvements and new features:

  • Docker Desktop 4.65.0 (March 16, 2026): Introduces “Gordon hints” for failed docker build, docker run, or docker compose commands, offering contextual suggestions. It also adds the docker dhi CLI plugin for managing Docker Hardened Images and updates components like Docker Scout CLI v1.20.1, Docker Agent v1.29.0, and Docker Buildx v0.32.1.
  • Docker Desktop 4.64.0 (March 11, 2026): Updated Docker Compose to v5.1.0, and further updates to Docker Scout CLI v1.20.0 and Docker Agent v1.27.1.
  • Docker Desktop 4.63.0 (March 2, 2026): Added SLSA v1 provenance support in the Builds view, updated Kubernetes to v1.34.3, and the Linux kernel to v6.12.72. The proxy settings UI was enhanced, and “Docker AI” references were rebranded to “Gordon.”

One known issue to be aware of is that the Windows MSI installer for Docker Desktop cannot update an existing installation if the current version is 4.59 or later. The workaround involves uninstalling the existing version before reinstalling, noting that this removes all associated data.

Practical Implications for Development and Infrastructure Teams

These recent updates carry significant implications for R&D teams:

  • Elevated Security Risk: The identified CVEs represent a tangible threat. Unpatched Docker Desktop installations are vulnerable to privilege escalation and potential container escapes, which could lead to unauthorized access to host resources, sensitive data, or complete system compromise. The TrendAIā„¢ Research findings on Docker Desktop WSL2 VM escape techniques further underscore the importance of maintaining isolation.
  • Disrupted Development Workflows: While the fixes are crucial, the rapid release cycle and potential for manual uninstallation/reinstallation (for the Windows MSI issue) can disrupt developer productivity. Teams must plan for these updates.
  • AI/ML Development Vulnerability: For teams leveraging Docker Desktop for AI/ML model development, the Docker Model Runner vulnerability (CVE-2026-28400) is particularly critical. Exploitation could lead to data loss or compromise of development models and environments.
  • CI/CD Pipeline Integrity: If Docker Desktop or Docker Engine is used within CI/CD pipelines (e.g., for local testing or building images), ensuring these environments are updated is paramount to prevent supply chain attacks.
  • Ecosystem Alignment: The Docker Engine v29’s move to a Containerd image store by default aligns Docker more closely with the broader cloud-native ecosystem, potentially simplifying Kubernetes integration but requiring awareness during upgrades.

Best Practices for Mitigating Risks and Optimizing Workflows

To navigate these updates effectively, R&D teams should implement the following best practices:

  1. Prioritize Immediate Updates: Upgrade all Docker Desktop installations to the latest stable version (4.65.0 or newer) without delay. For Windows users experiencing the MSI installer issue, plan for the necessary uninstall-reinstall process, ensuring data backups.
  2. Enable Enhanced Container Isolation (ECI): For Docker Desktop users, activate ECI to bolster the isolation between containers and the host, especially as a mitigation for vulnerabilities like CVE-2026-28400 affecting the Model Runner.
  3. Implement a Robust Patching Strategy: Establish a clear and regular schedule for updating Docker Engine and Docker Desktop across all development and testing environments. Automate this process where possible.
  4. Adhere to Least Privilege Principles: Always run containers and Docker daemon processes with the minimum necessary privileges. Avoid running containers as root unless absolutely essential and fully justified.
  5. Integrate Vulnerability Scanning: Regularly scan Docker images for known vulnerabilities using tools like Docker Scout or Trivy. Incorporate these scans into your CI/CD pipelines to catch issues early.
  6. Monitor Official Release Notes and Security Advisories: Subscribe to Docker’s official news channels and security announcements to stay informed about critical updates and emerging threats.
  7. Review Daemon Configuration: If you’ve previously overridden min-api-version settings in daemon.json for Docker Engine, review these configurations in light of v29’s minimum API version updates to ensure compatibility and security.
  8. Leverage Docker Hardened Images: Utilize Docker’s Hardened Images, now more accessible, to build your applications on a more secure foundation. The new docker dhi CLI plugin in 4.65.0 can aid in managing these.

Related Resources

Conclusion

The recent wave of Docker Desktop and Engine updates, particularly those addressing CVE-2026-2664 and CVE-2026-28400, serves as a stark reminder that even foundational development tools require continuous vigilance. For R&D engineers, staying ahead of these security concerns is not optional; it’s fundamental to building secure, reliable, and high-performing applications. By prioritizing immediate updates, implementing robust security practices, and actively monitoring Docker’s evolving ecosystem, teams can mitigate risks and continue to harness the immense power of containerization with confidence. The future of software development with Docker is one of increasing sophistication, especially with the integration of AI agents and enhanced security features, but only for those who commit to maintaining a secure and up-to-date environment.


Sources