CVE-2026-33743: CWE-770: Allocation of Resources Without Limits or Throttling in lxc incus
CVE-2026-33743 is a medium severity vulnerability in Incus, a system container and VM manager, affecting versions prior to 6. 23. 0. It involves allocation of resources without limits or throttling (CWE-770) triggered by a specially crafted storage bucket backup. An attacker with access to the storage bucket feature can crash the Incus daemon, causing a denial of service (DoS) on the control plane API. This does not affect running containers or VMs, which continue operating normally. The vulnerability requires low complexity exploitation with privileges to access the storage bucket feature but no user interaction. The issue is fixed in version 6. 23. 0.
AI Analysis
Technical Summary
CVE-2026-33743 is a resource allocation vulnerability classified under CWE-770, found in Incus, a system container and virtual machine manager developed by the LXC project. Prior to version 6.23.0, Incus improperly handles resource allocation when processing storage bucket backups. Specifically, a maliciously crafted storage bucket backup can cause Incus to allocate resources without any limits or throttling, leading to exhaustion of critical resources within the Incus daemon process. An attacker who has access to the storage bucket feature can exploit this flaw by repeatedly submitting crafted backups, causing the Incus daemon to crash. This results in a denial of service condition affecting the control plane API, which manages container and VM lifecycle operations. Importantly, this vulnerability does not impact the availability or operation of running workloads, containers, or virtual machines themselves; only the management interface is affected. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (access to storage bucket feature), no user interaction, and impacts availability only. No known exploits are reported in the wild as of the publication date. The issue is resolved in Incus version 6.23.0 by implementing proper resource allocation limits and throttling mechanisms during storage bucket backup processing.
Potential Impact
The primary impact of CVE-2026-33743 is a denial of service against the Incus control plane API, which can disrupt container and VM management operations such as creation, deletion, and configuration changes. While running workloads remain unaffected, the inability to manage containers or virtual machines can severely hinder operational agility and incident response capabilities. Organizations relying on Incus for container and VM orchestration may experience downtime in administrative functions, potentially delaying critical updates or scaling actions. In environments with automated orchestration or CI/CD pipelines dependent on Incus API availability, this vulnerability could cause cascading operational disruptions. Repeated exploitation could keep the control plane offline for extended periods, increasing operational risk. Although exploitation requires some privilege level, insider threats or compromised accounts with storage bucket access could leverage this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.
Mitigation Recommendations
The definitive mitigation is to upgrade Incus to version 6.23.0 or later, where the vulnerability is patched. Until upgrade is possible, organizations should restrict access to the storage bucket feature to trusted and minimal user sets, enforcing strict access controls and monitoring for unusual backup activity. Implement rate limiting or throttling at the network or application layer to detect and block repeated storage bucket backup requests that could trigger resource exhaustion. Employ logging and alerting on Incus daemon crashes or restarts to enable rapid detection of attempted exploitation. Consider isolating the Incus management API behind firewalls or VPNs to reduce exposure. Regularly audit user privileges to ensure only necessary users have storage bucket access. In environments using automated tooling, validate backup inputs to prevent injection of crafted payloads. Finally, maintain up-to-date backups and incident response plans to recover quickly from potential DoS conditions.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, Sweden
CVE-2026-33743: CWE-770: Allocation of Resources Without Limits or Throttling in lxc incus
Description
CVE-2026-33743 is a medium severity vulnerability in Incus, a system container and VM manager, affecting versions prior to 6. 23. 0. It involves allocation of resources without limits or throttling (CWE-770) triggered by a specially crafted storage bucket backup. An attacker with access to the storage bucket feature can crash the Incus daemon, causing a denial of service (DoS) on the control plane API. This does not affect running containers or VMs, which continue operating normally. The vulnerability requires low complexity exploitation with privileges to access the storage bucket feature but no user interaction. The issue is fixed in version 6. 23. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33743 is a resource allocation vulnerability classified under CWE-770, found in Incus, a system container and virtual machine manager developed by the LXC project. Prior to version 6.23.0, Incus improperly handles resource allocation when processing storage bucket backups. Specifically, a maliciously crafted storage bucket backup can cause Incus to allocate resources without any limits or throttling, leading to exhaustion of critical resources within the Incus daemon process. An attacker who has access to the storage bucket feature can exploit this flaw by repeatedly submitting crafted backups, causing the Incus daemon to crash. This results in a denial of service condition affecting the control plane API, which manages container and VM lifecycle operations. Importantly, this vulnerability does not impact the availability or operation of running workloads, containers, or virtual machines themselves; only the management interface is affected. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (access to storage bucket feature), no user interaction, and impacts availability only. No known exploits are reported in the wild as of the publication date. The issue is resolved in Incus version 6.23.0 by implementing proper resource allocation limits and throttling mechanisms during storage bucket backup processing.
Potential Impact
The primary impact of CVE-2026-33743 is a denial of service against the Incus control plane API, which can disrupt container and VM management operations such as creation, deletion, and configuration changes. While running workloads remain unaffected, the inability to manage containers or virtual machines can severely hinder operational agility and incident response capabilities. Organizations relying on Incus for container and VM orchestration may experience downtime in administrative functions, potentially delaying critical updates or scaling actions. In environments with automated orchestration or CI/CD pipelines dependent on Incus API availability, this vulnerability could cause cascading operational disruptions. Repeated exploitation could keep the control plane offline for extended periods, increasing operational risk. Although exploitation requires some privilege level, insider threats or compromised accounts with storage bucket access could leverage this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.
Mitigation Recommendations
The definitive mitigation is to upgrade Incus to version 6.23.0 or later, where the vulnerability is patched. Until upgrade is possible, organizations should restrict access to the storage bucket feature to trusted and minimal user sets, enforcing strict access controls and monitoring for unusual backup activity. Implement rate limiting or throttling at the network or application layer to detect and block repeated storage bucket backup requests that could trigger resource exhaustion. Employ logging and alerting on Incus daemon crashes or restarts to enable rapid detection of attempted exploitation. Consider isolating the Incus management API behind firewalls or VPNs to reduce exposure. Regularly audit user privileges to ensure only necessary users have storage bucket access. In environments using automated tooling, validate backup inputs to prevent injection of crafted payloads. Finally, maintain up-to-date backups and incident response plans to recover quickly from potential DoS conditions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T17:34:57.561Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c5ba613c064ed76fe1f5d1
Added to database: 3/26/2026, 10:59:45 PM
Last enriched: 3/26/2026, 11:15:31 PM
Last updated: 3/27/2026, 12:22:18 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.