CVE-2026-33898: CWE-287: Improper Authentication in lxc incus
CVE-2026-33898 is a high-severity improper authentication vulnerability in the Incus container and VM manager's local web server prior to version 6. 23. 0. The flaw arises because the web UI incorrectly validates authentication tokens passed via URL, accepting invalid tokens. This allows an attacker with local access or the ability to trick a user into interacting with the local web server to gain the same privileges as the user running Incus. Exploitation can lead to privilege escalation and unauthorized access to container instances and potentially system resources. The vulnerability is patched in Incus version 6. 23. 0. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
Incus is a system container and virtual machine manager that includes a local web server component launched by the `incus webui` command. This web server runs on a random localhost port and uses an authentication token embedded in a URL to grant access. When a user accesses the URL with the token, Incus sets a cookie to persist authentication for subsequent requests. However, prior to version 6.23.0, the web server incorrectly validates the token when it is passed in the URL, accepting invalid tokens. While the client correctly validates tokens stored in cookies, the initial URL token validation is flawed. This improper authentication (CWE-287) allows an attacker who can communicate with the local web server—either a local user or a remote attacker who can trick a user into accessing a malicious URL—to gain the same access rights as the legitimate user running Incus. This can lead to privilege escalation on the host system or unauthorized access to container and VM instances managed by Incus. The vulnerability has a CVSS 3.1 score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, with no privileges or authentication required but user interaction needed. The issue is resolved in version 6.23.0 of Incus.
Potential Impact
This vulnerability poses a significant risk to organizations using Incus for container and VM management. An attacker with local access or the ability to trick a user into interacting with the local web server can escalate privileges to that of the Incus user, potentially gaining control over container instances and underlying system resources. This could lead to data breaches, unauthorized system modifications, and disruption of containerized services. The impact extends to environments where Incus is used for multi-tenant or sensitive workloads, increasing the risk of lateral movement and persistent compromise. Since the web server runs locally on random ports, remote exploitation requires social engineering or local network access, but the high severity score reflects the broad impact if exploited. Organizations relying on Incus for virtualization and container orchestration must consider this a critical security issue.
Mitigation Recommendations
The primary mitigation is to upgrade Incus to version 6.23.0 or later, where the authentication token validation flaw is fixed. Until upgrading, organizations should restrict access to localhost ports used by `incus webui` to trusted users only, using local firewall rules or network policies to prevent unauthorized local or remote access. Users should be educated to avoid clicking on suspicious URLs that could lead to interaction with the Incus web UI. Additionally, monitoring local network traffic and system logs for unusual access patterns to the Incus web server can help detect exploitation attempts. Implementing strict user privilege separation and minimizing the number of users who can run `incus webui` reduces the attack surface. Finally, consider isolating the management interface in secure environments or using alternative management tools that do not expose local web servers.
Affected Countries
United States, Germany, China, Japan, United Kingdom, France, Canada, Australia, Netherlands, South Korea
CVE-2026-33898: CWE-287: Improper Authentication in lxc incus
Description
CVE-2026-33898 is a high-severity improper authentication vulnerability in the Incus container and VM manager's local web server prior to version 6. 23. 0. The flaw arises because the web UI incorrectly validates authentication tokens passed via URL, accepting invalid tokens. This allows an attacker with local access or the ability to trick a user into interacting with the local web server to gain the same privileges as the user running Incus. Exploitation can lead to privilege escalation and unauthorized access to container instances and potentially system resources. The vulnerability is patched in Incus version 6. 23. 0. No known exploits are currently reported in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Incus is a system container and virtual machine manager that includes a local web server component launched by the `incus webui` command. This web server runs on a random localhost port and uses an authentication token embedded in a URL to grant access. When a user accesses the URL with the token, Incus sets a cookie to persist authentication for subsequent requests. However, prior to version 6.23.0, the web server incorrectly validates the token when it is passed in the URL, accepting invalid tokens. While the client correctly validates tokens stored in cookies, the initial URL token validation is flawed. This improper authentication (CWE-287) allows an attacker who can communicate with the local web server—either a local user or a remote attacker who can trick a user into accessing a malicious URL—to gain the same access rights as the legitimate user running Incus. This can lead to privilege escalation on the host system or unauthorized access to container and VM instances managed by Incus. The vulnerability has a CVSS 3.1 score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, with no privileges or authentication required but user interaction needed. The issue is resolved in version 6.23.0 of Incus.
Potential Impact
This vulnerability poses a significant risk to organizations using Incus for container and VM management. An attacker with local access or the ability to trick a user into interacting with the local web server can escalate privileges to that of the Incus user, potentially gaining control over container instances and underlying system resources. This could lead to data breaches, unauthorized system modifications, and disruption of containerized services. The impact extends to environments where Incus is used for multi-tenant or sensitive workloads, increasing the risk of lateral movement and persistent compromise. Since the web server runs locally on random ports, remote exploitation requires social engineering or local network access, but the high severity score reflects the broad impact if exploited. Organizations relying on Incus for virtualization and container orchestration must consider this a critical security issue.
Mitigation Recommendations
The primary mitigation is to upgrade Incus to version 6.23.0 or later, where the authentication token validation flaw is fixed. Until upgrading, organizations should restrict access to localhost ports used by `incus webui` to trusted users only, using local firewall rules or network policies to prevent unauthorized local or remote access. Users should be educated to avoid clicking on suspicious URLs that could lead to interaction with the Incus web UI. Additionally, monitoring local network traffic and system logs for unusual access patterns to the Incus web server can help detect exploitation attempts. Implementing strict user privilege separation and minimizing the number of users who can run `incus webui` reduces the attack surface. Finally, consider isolating the management interface in secure environments or using alternative management tools that do not expose local web servers.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-24T15:41:47.490Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c5c16a3c064ed76fe46d11
Added to database: 3/26/2026, 11:29:46 PM
Last enriched: 3/26/2026, 11:45:12 PM
Last updated: 3/27/2026, 1:48:01 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.