Docker Desktop CVE-2026-5843: Model Runner Patch Guide

Update Docker Desktop for CVE-2026-5843 and recent Docker Model Runner fixes. Check admin workstations, homelab systems, and support laptops.
Docker Desktop CVE-2026-5843 Model Runner patch guide for admin workstations and homelabs

Impact statement: CVE-2026-5843 is a Docker Desktop security fix for Docker Model Runner, Docker’s local AI model feature. Docker describes the issue as container-to-host code execution in the MLX inference backend, fixed in Docker Desktop 4.71.0. That makes this more than a normal developer-tool update: if an admin workstation, build laptop, homelab desktop, or support machine uses Docker Desktop with Model Runner, update Docker Desktop and review whether Model Runner should be enabled at all.

For most production Linux servers running Docker Engine without Docker Desktop, this specific Docker Desktop advisory is a different risk profile. The danger zone is Docker Desktop on macOS, Windows, or Linux workstations where containers, test projects, AI model artifacts, customer code, or downloaded lab material may run near host files, VPN access, SSH keys, source repositories, browser sessions, or cloud credentials.

Who Needs To Check

  • Developers and admins using Docker Desktop with Docker Model Runner enabled.
  • Mac workstations, especially Apple silicon systems used for local AI model testing.
  • Windows admin/support machines that run Docker Desktop, WSL 2, Kubernetes, or customer test containers.
  • Homelab desktops that pull untrusted demos, AI examples, Compose stacks, or training projects.
  • Web-hosting providers that use Docker Desktop on staff laptops for staging, support reproduction, migration testing, plugin testing, or customer file handling.
  • CI helper machines or build workstations that are treated like trusted admin systems even though they run untrusted code.

Affected And Fixed Versions

Docker’s current security announcements page lists several recent Docker Desktop and Docker Model Runner fixes. The newest high-signal item in this pass is CVE-2026-5843, but the safest admin answer is to update Docker Desktop to the current release, not to stop at the oldest fixed build.

IssueDocker’s fixed releasePlain-English riskAdmin action
CVE-2026-5843Docker Desktop 4.71.0Container-to-host code execution risk in Docker Model Runner’s MLX inference backend.Update Docker Desktop to 4.71.0 or later, preferably the current release.
CVE-2026-5817Docker Desktop 4.68.0Container-to-host code execution risk in another Model Runner inference backend.Update any older Docker Desktop install and review Model Runner exposure.
CVE-2026-33990Docker Desktop 4.67.0Model Runner registry-handling weakness that can cross trust boundaries.Update Docker Desktop and avoid untrusted model sources.
CVE-2026-28400Docker Desktop 4.62.0Model Runner control-plane weakness that could affect files available to the Model Runner process.Update and disable Model Runner when it is not needed.
CVE-2026-2664Docker Desktop 4.62.0gRPC-FUSE kernel-module memory safety issue.Update Docker Desktop and reboot where the installer or OS requires it.

As of this post, Docker Desktop 4.74.0 is listed in Docker’s release notes, dated May 19, 2026. If your workstation is older than 4.71.0, treat the update as urgent when Model Runner is enabled. If you are already newer than 4.71.0, still move to the current supported Docker Desktop release during normal maintenance.

Exploitation Status

I did not find a CISA KEV entry for CVE-2026-5843 during this pass. That does not make it safe to ignore. The words container-to-host code execution should get an admin’s attention because Docker Desktop often runs on machines that also hold browser sessions, SSH keys, VPN access, local source trees, support files, and customer staging data.

The defensive takeaway is simple: update Docker Desktop, reduce Model Runner exposure, and be much stricter about what model artifacts and demo containers are allowed on trusted admin workstations.

Safe Update Checklist

  • Inventory Docker Desktop installs. Check Mac, Windows, Linux desktop, support, build, and homelab machines, not only production servers.
  • Update Docker Desktop. Use Docker Desktop’s built-in update flow or your normal software-management tool and move to the current release.
  • Reboot if required. Windows, WSL 2, Hyper-V, kernel extensions, file-sharing drivers, and macOS helpers may need a clean restart after the update.
  • Confirm the visible Desktop version. Check Docker Desktop’s About screen after restart and make sure the old build is not still running.
  • Check Model Runner status. Disable Docker Model Runner if you do not need local AI model serving on that workstation.
  • Restrict TCP access. If Model Runner must be enabled, keep access local and intentional. Do not leave it exposed to untrusted networks or broad container workflows.
  • Review model sources. Treat downloaded model artifacts and AI demo projects like executable software, especially when they come from unknown accounts or public examples.
  • Restart active containers. Recreate test containers and local Kubernetes workloads after Docker Desktop is updated so they are using the updated Desktop environment.
  • Audit sensitive local files. Pay attention to mounted home directories, SSH material, cloud config folders, Git checkouts, customer files, and backup exports.
  • Document staff-machine coverage. For MSPs and hosting providers, track which support/admin machines were updated, when they rebooted, and whether Model Runner remains enabled.

Windows Admin Notes

For Windows machines, remember that Docker Desktop often sits beside WSL 2, Hyper-V, RDP tools, VPN clients, browser profiles, password managers, SSH keys, and customer support folders. Update through Docker Desktop, Intune, RMM, winget, or your normal software deployment process, then reboot and verify the Desktop version from the app after sign-in.

On Windows-based hosting support machines, avoid running customer-supplied Compose projects with broad host-folder mounts. If a project must be tested locally, use a disposable VM or a low-trust workstation profile instead of a daily admin account that has access to production panels, customer archives, or cloud consoles.

Mac And Homelab Notes

Docker Model Runner first landed in the Apple silicon local-AI workflow, so Mac users should pay special attention. If you test random AI projects, model files, examples, or copied Compose stacks on the same Mac that stores SSH keys, browser sessions, synced customer files, or admin scripts, separate that work. Use a throwaway VM, a separate user profile, or a dedicated lab machine for untrusted testing.

For homelab users, this is the same lesson as with hypervisors and NAS boxes: do not let the convenient testing workstation become the most trusted machine in the environment. Keep Docker Desktop updated, reduce host mounts, and do not treat AI model artifacts as harmless data.

Web-Hosting Provider Guidance

This advisory matters even if your production hosting nodes run plain Docker Engine, containerd, Kubernetes, Proxmox, or traditional cPanel/Plesk stacks. Staff workstations are part of the hosting security boundary. A support laptop that opens customer files, tests migrations, logs into WHM, connects to Plesk, or pulls customer repositories can become a bridge between untrusted customer material and privileged management access.

  • Require current Docker Desktop on support and development machines.
  • Disable Docker Model Runner by policy unless the user has a real need for it.
  • Keep customer test projects away from admin browser sessions and password-manager unlock windows.
  • Prefer disposable test VMs for unknown Compose stacks, plugin packages, or customer uploads.
  • Review shared folders and mounted volumes before running customer code locally.
  • Make staff machine patching part of customer maintenance readiness, not an afterthought.

Temporary Mitigation

The real fix is updating Docker Desktop. While scheduling the update, disable Docker Model Runner where possible, stop loading untrusted model artifacts, avoid broad host-folder mounts, keep Docker Desktop away from high-privilege admin sessions, and use disposable lab environments for unknown demos. Temporary controls are useful, but they do not replace the fixed Docker Desktop release.

Post-Update Verification

  • Docker Desktop shows the current version after restart.
  • Docker Engine, Compose, and local Kubernetes still start normally.
  • Model Runner is disabled unless there is a business or lab reason for it.
  • Any enabled Model Runner access is local, intentional, and documented.
  • Old test containers, stale lab stacks, and unused model artifacts have been removed.
  • Workstation security tools, backup agents, and RMM tools still report healthy status after reboot.

Related Fix I.T. Phill Guides

Sources

Picture of admin

admin

Leave a Reply

About Us

Fix I.T. Phill is a site dedicated to sharing knowledge freely to the public.  Use our Contact Us Form to submit new requests for tutorials that we will get up and ready for you ASAP!

Recent Posts

Follow Us

Sign up for our Newsletter

Get the latest information on what is going on in the I.T. World.