Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-19115 Incus Allocation of Resources Without Limits allows firewall rule bypass on managed bridge networks
Github GHSA Github GHSA GHSA-9q7c-qmhm-jv86 Incus Allocation of Resources Without Limits allows firewall rule bypass on managed bridge networks
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00026}

epss

{'score': 0.0003}


Wed, 25 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Jun 2025 17:00:00 +0000

Type Values Removed Values Added
Description Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.
Title Incus vulnerable to DoS through antispoofing nftables firewall rule bypass on bridge networks with ACLs
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 3.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-06-25T17:54:29.213Z

Reserved: 2025-06-20T17:42:25.709Z

Link: CVE-2025-52889

cve-icon Vulnrichment

Updated: 2025-06-25T17:54:22.341Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-25T17:15:39.200

Modified: 2025-06-26T18:57:43.670

Link: CVE-2025-52889

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.