We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52889

Incus vulnerable to DoS through antispoofing nftables firewall rule bypass on bridge networks with ACLs



Description

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.

Reserved 2025-06-20 | Published 2025-06-25 | Updated 2025-06-25 | Assigner GitHub_M


LOW: 3.4CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

>= 6.12, <= 6.13
affected

References

github.com/lxc/incus/security/advisories/GHSA-9q7c-qmhm-jv86

github.com/...ommit/2516fb19ad8428454cb4edfe70c0a5f0dc1da214

github.com/...ommit/a7c33301738aede3c035063e973b1d885d9bac7c

cve.org (CVE-2025-52889)

nvd.nist.gov (CVE-2025-52889)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52889

Support options

Helpdesk Chat, Email, Knowledgebase