Description
Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion. As versions prior to 6.23.0 use predictable paths under /tmp for this, an attacker with local access to the system can abuse this mechanism by creating their own symlinks ahead of time. On the vast majority of Linux systems, this will result in a "Permission denied" error when requesting a screenshot. That's because the Linux kernel has a security feature designed to block such attacks, `protected_symlinks`. On the rare systems with this purposefully disabled, it's then possible to trick Incus intro truncating and altering the mode and permissions of arbitrary files on the filesystem, leading to a potential denial of service or possible local privilege escalation. Version 6.23.0 fixes the issue.
Published: 2026-03-26
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch Now
AI Analysis

Impact

Incus, a system container and virtual machine manager, exposes an API that retrieves virtual machine screenshots. The API writes the image to a temporary file in a predictable location under /tmp before sending it back to the requester and deleting the file. When Incus versions prior to 6.23.0 are used, an attacker who can run commands locally can create a symlink in /tmp pointing to a file of the attacker’s choice. If the kernel’s protected_symlinks feature is disabled, Incus will follow the symlink, allowing the attacker to truncate the target file and alter its mode and ownership. This can lead to denial of service or local privilege escalation, as the attacker may gain unauthorized write access to arbitrary filesystem objects. The vulnerability involves path traversal weaknesses (CWE‑59 and CWE‑61).

Affected Systems

The affected product is Incus from the Linux Containers project. Versions earlier than 6.23.0 are vulnerable to this exploit. The changelog for 6.23.0 and later mitigates the issue by using non‑predictable temporary file paths.

Risk and Exploitability

The CVSS score of 4.7 indicates a moderate severity, and the EPSS score of less than 1% suggests that the likelihood of exploitation is low under current conditions. The vulnerability is not listed in the CISA KEV catalog. The attack requires local system access and the ability to create symlinks in the /tmp directory. It is inferred that the most probable attack vector is an authenticated local user who has write permissions in the Incus environment or the /tmp filesystem.

Generated by OpenCVE AI on March 30, 2026 at 21:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Incus to version 6.23.0 or later
  • Ensure the kernel’s protected_symlinks feature is enabled to mitigate symlink attacks
  • Restrict local user privileges that allow write access to Incus-specified temporary directories
  • Monitor Incus logs for unexpected screenshot requests or permission errors

Generated by OpenCVE AI on March 30, 2026 at 21:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q9vp-3wcg-8p4x Incus vulnerable to local privilege escalation through VM screenshot path
History

Mon, 30 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Linuxcontainers
Linuxcontainers incus
CPEs cpe:2.3:a:linuxcontainers:incus:*:*:*:*:*:*:*:*
Vendors & Products Linuxcontainers
Linuxcontainers incus
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

threat_severity

Important


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Lxc
Lxc incus
Vendors & Products Lxc
Lxc incus

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion. As versions prior to 6.23.0 use predictable paths under /tmp for this, an attacker with local access to the system can abuse this mechanism by creating their own symlinks ahead of time. On the vast majority of Linux systems, this will result in a "Permission denied" error when requesting a screenshot. That's because the Linux kernel has a security feature designed to block such attacks, `protected_symlinks`. On the rare systems with this purposefully disabled, it's then possible to trick Incus intro truncating and altering the mode and permissions of arbitrary files on the filesystem, leading to a potential denial of service or possible local privilege escalation. Version 6.23.0 fixes the issue.
Title Incus vulnerable to local privilege escalation through VM screenshot path
Weaknesses CWE-61
References
Metrics cvssV4_0

{'score': 4.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T20:00:18.358Z

Reserved: 2026-03-23T17:06:05.747Z

Link: CVE-2026-33711

cve-icon Vulnrichment

Updated: 2026-03-27T14:10:23.208Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T23:16:20.423

Modified: 2026-03-30T18:51:41.500

Link: CVE-2026-33711

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-26T22:37:29Z

Links: CVE-2026-33711 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:01:25Z

Weaknesses