Executive Summary

Informations
Name CVE-2025-52889 First vendor Publication 2025-06-25
Vendor Cve Last vendor Modification 2025-06-25

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52889

Sources (Detail)

https://github.com/lxc/incus/commit/2516fb19ad8428454cb4edfe70c0a5f0dc1da214
https://github.com/lxc/incus/commit/a7c33301738aede3c035063e973b1d885d9bac7c
https://github.com/lxc/incus/security/advisories/GHSA-9q7c-qmhm-jv86
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-06-26 00:20:34
  • Multiple Updates
2025-06-25 21:20:33
  • First insertion