Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33743: CWE-770: Allocation of Resources Without Limits or Throttling in lxc incus

0
Medium
VulnerabilityCVE-2026-33743cvecve-2026-33743cwe-770
Published: Thu Mar 26 2026 (03/26/2026, 22:40:07 UTC)
Source: CVE Database V5
Vendor/Project: lxc
Product: incus

Description

CVE-2026-33743 is a medium severity vulnerability in Incus, a system container and VM manager, affecting versions prior to 6. 23. 0. It involves allocation of resources without limits or throttling (CWE-770) triggered by a specially crafted storage bucket backup. An attacker with access to the storage bucket feature can crash the Incus daemon, causing a denial of service (DoS) on the control plane API. This does not affect running containers or VMs, which continue operating normally. The vulnerability requires low complexity exploitation with privileges to access the storage bucket feature but no user interaction. The issue is fixed in version 6. 23. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 23:15:31 UTC

Technical Analysis

CVE-2026-33743 is a resource allocation vulnerability classified under CWE-770, found in Incus, a system container and virtual machine manager developed by the LXC project. Prior to version 6.23.0, Incus improperly handles resource allocation when processing storage bucket backups. Specifically, a maliciously crafted storage bucket backup can cause Incus to allocate resources without any limits or throttling, leading to exhaustion of critical resources within the Incus daemon process. An attacker who has access to the storage bucket feature can exploit this flaw by repeatedly submitting crafted backups, causing the Incus daemon to crash. This results in a denial of service condition affecting the control plane API, which manages container and VM lifecycle operations. Importantly, this vulnerability does not impact the availability or operation of running workloads, containers, or virtual machines themselves; only the management interface is affected. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (access to storage bucket feature), no user interaction, and impacts availability only. No known exploits are reported in the wild as of the publication date. The issue is resolved in Incus version 6.23.0 by implementing proper resource allocation limits and throttling mechanisms during storage bucket backup processing.

Potential Impact

The primary impact of CVE-2026-33743 is a denial of service against the Incus control plane API, which can disrupt container and VM management operations such as creation, deletion, and configuration changes. While running workloads remain unaffected, the inability to manage containers or virtual machines can severely hinder operational agility and incident response capabilities. Organizations relying on Incus for container and VM orchestration may experience downtime in administrative functions, potentially delaying critical updates or scaling actions. In environments with automated orchestration or CI/CD pipelines dependent on Incus API availability, this vulnerability could cause cascading operational disruptions. Repeated exploitation could keep the control plane offline for extended periods, increasing operational risk. Although exploitation requires some privilege level, insider threats or compromised accounts with storage bucket access could leverage this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.

Mitigation Recommendations

The definitive mitigation is to upgrade Incus to version 6.23.0 or later, where the vulnerability is patched. Until upgrade is possible, organizations should restrict access to the storage bucket feature to trusted and minimal user sets, enforcing strict access controls and monitoring for unusual backup activity. Implement rate limiting or throttling at the network or application layer to detect and block repeated storage bucket backup requests that could trigger resource exhaustion. Employ logging and alerting on Incus daemon crashes or restarts to enable rapid detection of attempted exploitation. Consider isolating the Incus management API behind firewalls or VPNs to reduce exposure. Regularly audit user privileges to ensure only necessary users have storage bucket access. In environments using automated tooling, validate backup inputs to prevent injection of crafted payloads. Finally, maintain up-to-date backups and incident response plans to recover quickly from potential DoS conditions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:34:57.561Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5ba613c064ed76fe1f5d1

Added to database: 3/26/2026, 10:59:45 PM

Last enriched: 3/26/2026, 11:15:31 PM

Last updated: 3/27/2026, 12:22:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses