Impact
Incus, a container and virtual machine manager, did not verify the combined fingerprint of images downloaded from simplestreams servers. This omission allows an attacker to poison the image cache, potentially causing other tenants to pull and run attacker‑controlled images instead of the intended ones. The weakness can lead to code execution within the affected containers, exposing confidentiality, integrity, and availability of the host and other tenants.
Affected Systems
The vulnerability affects all Incus installations up to and including version 6.23.0. It arises when the system retrieves images from simplestreams image servers. Versions 6.23.0 and later incorporate a fix that validates image fingerprints during download.
Risk and Exploitability
The CVSS score of 5.7 indicates moderate severity. EPSS information is not available and the vulnerability is not listed in the KEV catalog, suggesting limited known exploitation at present. The likely attack vector involves an attacker controlling or compromising a simplestreams image repository, enabling the delivery of a malicious image that bypasses the cache. Once delivered, the attacker could execute arbitrary code within the target container, potentially affecting other tenants sharing the host.
OpenCVE Enrichment