Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry.
History

Tue, 29 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Apr 2025 17:30:00 +0000

Type Values Removed Values Added
Description Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry.
Title Registry Access Management (RAM) policies not applied when sign-in enforcement is configured via a configuration profile
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 4.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Docker

Published: 2025-04-29T17:16:16.894Z

Updated: 2025-04-29T18:00:02.591Z

Reserved: 2025-04-29T14:22:36.344Z

Link: CVE-2025-4095

cve-icon Vulnrichment

Updated: 2025-04-29T17:59:59.120Z

cve-icon NVD

Status : Received

Published: 2025-04-29T18:15:46.180

Modified: 2025-04-29T18:15:46.180

Link: CVE-2025-4095

cve-icon Redhat

No data.