Impact
A specially crafted storage bucket backup file can cause the Incus daemon to crash. Repeated use results in a denial of service to the Incus control plane API, while existing containers and virtual machines continue to operate normally. The vulnerability does not affect in‑use workloads but disrupts management and orchestration functions.
Affected Systems
The issue affects the Incus container and virtual machine manager from vendor lxc, versions prior to 6.23.0. These systems expose a storage bucket backup capability that an authenticated user can exploit.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. Since the exploit requires only crafted backup operations, it is relatively easy for a user with storage bucket privileges to execute. Because the attack does not involve remote code execution or privilege escalation, it is confined to causing service disruption rather than compromising system security. The vulnerability is not listed in CISA's KEV catalog and EPSS is not available, but the impact on management availability makes it significant for environments relying on Incus for orchestration.
OpenCVE Enrichment