We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52890

Incus vulnerable to antispoofing nftables firewall rule bypass on bridge networks with ACLs



Description

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.

Reserved 2025-06-20 | Published 2025-06-25 | Updated 2025-06-25 | Assigner GitHub_M


HIGH: 8.1CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H

Problem types

CWE-863: Incorrect Authorization

Product status

>= 6.12, <= 6.13
affected

References

github.com/lxc/incus/security/advisories/GHSA-p7fw-vjjm-2rwp

github.com/...ommit/254dfd2483ab8de39b47c2258b7f1cf0759231c8

cve.org (CVE-2025-52890)

nvd.nist.gov (CVE-2025-52890)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52890

Support options

Helpdesk Chat, Email, Knowledgebase