Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-6027-1 incus security update
Debian DSA Debian DSA DSA-6028-1 lxd security update
EUVD EUVD EUVD-2025-32097 Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.
Github GHSA Github GHSA GHSA-7232-97c6-j525 Canonical LXD Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 24 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Linux linux Kernel
CPEs cpe:2.3:a:canonical:lxd:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Vendors & Products Linux linux Kernel
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Fri, 03 Oct 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical lxd
Linux
Linux linux
Vendors & Products Canonical
Canonical lxd
Linux
Linux linux

Thu, 02 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Oct 2025 09:30:00 +0000

Type Values Removed Values Added
Description Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.
Title Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server
Weaknesses CWE-290
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2025-10-02T13:22:55.575Z

Reserved: 2025-07-18T07:59:07.917Z

Link: CVE-2025-54288

cve-icon Vulnrichment

Updated: 2025-10-02T13:22:45.355Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-02T10:15:38.887

Modified: 2025-10-24T14:44:18.773

Link: CVE-2025-54288

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-03T08:22:56Z