CVE-2026-28400
Docker · Docker Model Runner (DMR)
Docker Model Runner (DMR), used for managing AI models, contains a high-severity vulnerability that could lead to unauthorized access or model manipulation.
Executive summary
A security vulnerability in Docker Model Runner (DMR) poses a high risk to AI deployment environments, potentially allowing for the unauthorized execution of commands or manipulation of AI models.
Vulnerability
The vulnerability exists within the Docker Model Runner (DMR) software. With a CVSS score of 7.5, the flaw likely involves improper isolation or inadequate access controls within the model deployment pipeline, potentially allowing an attacker to interact with the containerized environment in an unauthorized manner.
Business impact
Exploitation of this vulnerability could lead to the compromise of proprietary AI models, unauthorized data access within the Docker environment, or the use of infrastructure for malicious computing. The CVSS score of 7.5 indicates a high severity, particularly for organizations integrating AI into their core production workflows.
Remediation
Immediate Action: Apply the latest security updates for Docker Model Runner immediately to ensure all components are patched against this flaw.
Proactive Monitoring: Audit container logs and network traffic for unusual activity originating from or directed toward DMR-managed instances.
Compensating Controls: Implement strict network segmentation for AI model deployment environments and use container security scanning tools to detect anomalous configurations.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations utilizing Docker Model Runner for AI deployments should prioritize this update. Immediate remediation is necessary to maintain the integrity of AI models and the security of the underlying Docker infrastructure.