Site icon Fix I.T. Phill – Your Go-To Tech Guru

Docker Desktop CVE-2026-5843: Model Runner Patch Guide

Docker Desktop CVE-2026-5843 Model Runner patch guide for admin workstations and homelabs

Docker Desktop CVE-2026-5843 Model Runner patch guide for admin workstations and homelabs

Impact statement: CVE-2026-5843 is a Docker Desktop security fix for Docker Model Runner, Docker’s local AI model feature. Docker describes the issue as container-to-host code execution in the MLX inference backend, fixed in Docker Desktop 4.71.0. That makes this more than a normal developer-tool update: if an admin workstation, build laptop, homelab desktop, or support machine uses Docker Desktop with Model Runner, update Docker Desktop and review whether Model Runner should be enabled at all.

For most production Linux servers running Docker Engine without Docker Desktop, this specific Docker Desktop advisory is a different risk profile. The danger zone is Docker Desktop on macOS, Windows, or Linux workstations where containers, test projects, AI model artifacts, customer code, or downloaded lab material may run near host files, VPN access, SSH keys, source repositories, browser sessions, or cloud credentials.

Who Needs To Check

Affected And Fixed Versions

Docker’s current security announcements page lists several recent Docker Desktop and Docker Model Runner fixes. The newest high-signal item in this pass is CVE-2026-5843, but the safest admin answer is to update Docker Desktop to the current release, not to stop at the oldest fixed build.

IssueDocker’s fixed releasePlain-English riskAdmin action
CVE-2026-5843Docker Desktop 4.71.0Container-to-host code execution risk in Docker Model Runner’s MLX inference backend.Update Docker Desktop to 4.71.0 or later, preferably the current release.
CVE-2026-5817Docker Desktop 4.68.0Container-to-host code execution risk in another Model Runner inference backend.Update any older Docker Desktop install and review Model Runner exposure.
CVE-2026-33990Docker Desktop 4.67.0Model Runner registry-handling weakness that can cross trust boundaries.Update Docker Desktop and avoid untrusted model sources.
CVE-2026-28400Docker Desktop 4.62.0Model Runner control-plane weakness that could affect files available to the Model Runner process.Update and disable Model Runner when it is not needed.
CVE-2026-2664Docker Desktop 4.62.0gRPC-FUSE kernel-module memory safety issue.Update Docker Desktop and reboot where the installer or OS requires it.

As of this post, Docker Desktop 4.74.0 is listed in Docker’s release notes, dated May 19, 2026. If your workstation is older than 4.71.0, treat the update as urgent when Model Runner is enabled. If you are already newer than 4.71.0, still move to the current supported Docker Desktop release during normal maintenance.

Exploitation Status

I did not find a CISA KEV entry for CVE-2026-5843 during this pass. That does not make it safe to ignore. The words container-to-host code execution should get an admin’s attention because Docker Desktop often runs on machines that also hold browser sessions, SSH keys, VPN access, local source trees, support files, and customer staging data.

The defensive takeaway is simple: update Docker Desktop, reduce Model Runner exposure, and be much stricter about what model artifacts and demo containers are allowed on trusted admin workstations.

Safe Update Checklist

Windows Admin Notes

For Windows machines, remember that Docker Desktop often sits beside WSL 2, Hyper-V, RDP tools, VPN clients, browser profiles, password managers, SSH keys, and customer support folders. Update through Docker Desktop, Intune, RMM, winget, or your normal software deployment process, then reboot and verify the Desktop version from the app after sign-in.

On Windows-based hosting support machines, avoid running customer-supplied Compose projects with broad host-folder mounts. If a project must be tested locally, use a disposable VM or a low-trust workstation profile instead of a daily admin account that has access to production panels, customer archives, or cloud consoles.

Mac And Homelab Notes

Docker Model Runner first landed in the Apple silicon local-AI workflow, so Mac users should pay special attention. If you test random AI projects, model files, examples, or copied Compose stacks on the same Mac that stores SSH keys, browser sessions, synced customer files, or admin scripts, separate that work. Use a throwaway VM, a separate user profile, or a dedicated lab machine for untrusted testing.

For homelab users, this is the same lesson as with hypervisors and NAS boxes: do not let the convenient testing workstation become the most trusted machine in the environment. Keep Docker Desktop updated, reduce host mounts, and do not treat AI model artifacts as harmless data.

Web-Hosting Provider Guidance

This advisory matters even if your production hosting nodes run plain Docker Engine, containerd, Kubernetes, Proxmox, or traditional cPanel/Plesk stacks. Staff workstations are part of the hosting security boundary. A support laptop that opens customer files, tests migrations, logs into WHM, connects to Plesk, or pulls customer repositories can become a bridge between untrusted customer material and privileged management access.

Temporary Mitigation

The real fix is updating Docker Desktop. While scheduling the update, disable Docker Model Runner where possible, stop loading untrusted model artifacts, avoid broad host-folder mounts, keep Docker Desktop away from high-privilege admin sessions, and use disposable lab environments for unknown demos. Temporary controls are useful, but they do not replace the fixed Docker Desktop release.

Post-Update Verification

Related Fix I.T. Phill Guides

Sources

Exit mobile version