Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

DockerDash Flaw in Docker AI Assistant Leads to RCE, Data Theft

The critical vulnerability exists in the contextual trust in MCP Gateway architecture, as instructions are passed without validation.

Docker security

A critical-severity bug in Docker’s Ask Gordon AI assistant can be exploited to compromise Docker environments, cybersecurity firm Noma Security warns.

Named DockerDash, the bug exists in the MCP Gateway’s contextual trust, where malicious instructions injected into a Docker image’s metadata labels are forwarded to the MCP and executed without validation.

“In modern AI architectures, the Model Context Protocol (MCP) acts as a bridge between the LLM and the local environment (files, Docker containers, databases). MCPs provide the ‘context’ AI needs to answer questions,” Noma explains.

Because the MCP Gateway does not distinguish between informational metadata and runnable internal instructions, an attacker can embed malicious instructions in the metadata fields of a Docker image.

“Gordon AI reads and interprets the malicious instruction, forwards it to the MCP Gateway, which then executes it through MCP tools. Every stage happens with zero validation, taking advantage of current agents and MCP Gateway architecture,” Noma says.

The cybersecurity firm has named the technique ‘meta-context injection’ and explains that it allows an attacker to hijack an AI’s reasoning process.

Advertisement. Scroll to continue reading.

Ask Gordon is embedded in Docker Desktop and the Docker CLI, and a successful attack could have one of two outcomes: for cloud/CLI systems, it leads to remote code execution (RCE), while desktop applications are exposed to data exfiltration.

Both attack chains rely on Ask Gordon to process malicious instructions masquerading as a benign image description. However, the desktop implementation of the AI prevents command execution and can only be used for data theft.

“An attacker can still weaponize Ask Gordon’s read access to exfiltrate sensitive internal data about the victim’s environment,” Noma says.

The main issue, the cybersecurity firm underlines, is that the AI assistant trusts all image metadata as safe contextual information and interprets commands in metadata as legitimate tasks, that the MCP Gateway trusts the AI’s requests as user-authorized, and that MCP tools provide broad system visibility.

Docker Desktop version 4.50.0 was released in November with fixes for both attack paths. Ask Gordon now blocks data exfiltration via image tag injection and requires explicit confirmation before executing built-in and user-added MCP tools.

Related: Security Analysis of Moltbook Agent Network: Bot-to-Bot Prompt Injection and Data Leaks

Related: Vulnerability Allows Hackers to Hijack OpenClaw AI Assistant

Related: 175,000 Exposed Ollama Hosts Could Enable LLM Abuse

Related: LLMs Hijacked, Monetized in ‘Operation Bizarre Bazaar’

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Jacki Monson has joined CVS Health as SVP, Deputy CISO.

Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.