Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 29 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 29 Apr 2025 17:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry. | |
| Title | Registry Access Management (RAM) policies not applied when sign-in enforcement is configured via a configuration profile | |
| Weaknesses | CWE-862 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Docker
Published: 2025-04-29T17:16:16.894Z
Updated: 2025-04-29T18:00:02.591Z
Reserved: 2025-04-29T14:22:36.344Z
Link: CVE-2025-4095
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-04-29T17:59:59.120Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-04-29T18:15:46.180
Modified: 2025-05-02T13:53:40.163
Link: CVE-2025-4095
 Redhat
                        Redhat
                    No data.