A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS.