Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33711: CWE-61: UNIX Symbolic Link (Symlink) Following in lxc incus

0
Medium
VulnerabilityCVE-2026-33711cvecve-2026-33711cwe-61
Published: Thu Mar 26 2026 (03/26/2026, 22:37:29 UTC)
Source: CVE Database V5
Vendor/Project: lxc
Product: incus

Description

CVE-2026-33711 is a medium severity vulnerability in Incus, a system container and VM manager, affecting versions prior to 6. 23. 0. The issue arises from the use of predictable temporary file paths under /tmp for QEMU VM screenshots, allowing local attackers to create symbolic links (symlinks) that can be followed by Incus. On most Linux systems, the kernel's protected_symlinks feature prevents exploitation, resulting in permission denied errors. However, on systems where this protection is disabled, attackers can manipulate arbitrary files by truncating and changing their permissions, potentially causing denial of service or local privilege escalation. The vulnerability requires local access and some privileges but no user interaction. The fix is included in Incus version 6. 23. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 23:15:44 UTC

Technical Analysis

Incus, a system container and virtual machine manager, provides an API to retrieve VM screenshots by having QEMU write to a temporary file in /tmp, which Incus then reads and deletes. Versions of Incus prior to 6.23.0 use predictable file paths for these temporary screenshot files. This predictability allows a local attacker with some privileges to pre-create symbolic links at these paths. When Incus attempts to write the screenshot, it follows the symlink, potentially writing to arbitrary files. On most Linux systems, the kernel enforces the protected_symlinks feature, which prevents following symlinks in /tmp owned by other users, resulting in permission denied errors and blocking exploitation. However, on systems where protected_symlinks is disabled, Incus can be tricked into truncating and modifying the mode and permissions of arbitrary files. This can lead to denial of service by corrupting critical files or local privilege escalation by altering permissions on sensitive files. The vulnerability is tracked as CWE-61 (Improper Handling of Symbolic Links). Exploitation requires local access and some privileges but no user interaction. The issue is fixed in Incus version 6.23.0 by presumably using safer temporary file handling mechanisms that avoid predictable paths or symlink following.

Potential Impact

The vulnerability allows local attackers to manipulate arbitrary files on the filesystem by exploiting Incus's predictable temporary file usage and symlink following. This can lead to denial of service by corrupting or truncating important files, potentially disrupting container or VM operations. More critically, it can enable local privilege escalation by changing file permissions, allowing attackers to gain higher privileges on the host system. Organizations running vulnerable versions of Incus on Linux systems without protected_symlinks enabled are at risk. Since Incus is used in container and VM management, exploitation could compromise the isolation and security of virtualized environments, impacting cloud providers, hosting services, and enterprises relying on containerization. The requirement for local access limits remote exploitation but insider threats or compromised accounts could leverage this vulnerability. The medium CVSS score reflects moderate impact and exploitation complexity.

Mitigation Recommendations

The primary mitigation is to upgrade Incus to version 6.23.0 or later, which addresses the vulnerability by changing how temporary files are handled. For environments where immediate upgrade is not possible, administrators should ensure that the Linux kernel's protected_symlinks feature is enabled and enforced, as it effectively blocks exploitation by preventing symlink following in /tmp. Additionally, restrict local user privileges to minimize the ability of untrusted users to create symlinks in /tmp or access Incus APIs. Implement strict access controls and monitoring on systems running Incus to detect suspicious symlink creation or file modifications. Consider using filesystem namespaces or mandatory access controls (e.g., SELinux, AppArmor) to limit Incus's file system interactions. Regularly audit and monitor /tmp directory usage and permissions to detect potential symlink attacks. Finally, educate system administrators about the risks of disabling kernel security features like protected_symlinks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.747Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c5ba613c064ed76fe1f5ce

Added to database: 3/26/2026, 10:59:45 PM

Last enriched: 3/26/2026, 11:15:44 PM

Last updated: 3/27/2026, 12:22:59 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses