Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33898: CWE-287: Improper Authentication in lxc incus

0
High
VulnerabilityCVE-2026-33898cvecve-2026-33898cwe-287
Published: Thu Mar 26 2026 (03/26/2026, 23:25:45 UTC)
Source: CVE Database V5
Vendor/Project: lxc
Product: incus

Description

CVE-2026-33898 is a high-severity improper authentication vulnerability in the Incus container and VM manager's local web server prior to version 6. 23. 0. The flaw arises because the web UI incorrectly validates authentication tokens passed via URL, accepting invalid tokens. This allows an attacker with local access or the ability to trick a user into interacting with the local web server to gain the same privileges as the user running Incus. Exploitation can lead to privilege escalation and unauthorized access to container instances and potentially system resources. The vulnerability is patched in Incus version 6. 23. 0. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 23:45:12 UTC

Technical Analysis

Incus is a system container and virtual machine manager that includes a local web server component launched by the `incus webui` command. This web server runs on a random localhost port and uses an authentication token embedded in a URL to grant access. When a user accesses the URL with the token, Incus sets a cookie to persist authentication for subsequent requests. However, prior to version 6.23.0, the web server incorrectly validates the token when it is passed in the URL, accepting invalid tokens. While the client correctly validates tokens stored in cookies, the initial URL token validation is flawed. This improper authentication (CWE-287) allows an attacker who can communicate with the local web server—either a local user or a remote attacker who can trick a user into accessing a malicious URL—to gain the same access rights as the legitimate user running Incus. This can lead to privilege escalation on the host system or unauthorized access to container and VM instances managed by Incus. The vulnerability has a CVSS 3.1 score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, with no privileges or authentication required but user interaction needed. The issue is resolved in version 6.23.0 of Incus.

Potential Impact

This vulnerability poses a significant risk to organizations using Incus for container and VM management. An attacker with local access or the ability to trick a user into interacting with the local web server can escalate privileges to that of the Incus user, potentially gaining control over container instances and underlying system resources. This could lead to data breaches, unauthorized system modifications, and disruption of containerized services. The impact extends to environments where Incus is used for multi-tenant or sensitive workloads, increasing the risk of lateral movement and persistent compromise. Since the web server runs locally on random ports, remote exploitation requires social engineering or local network access, but the high severity score reflects the broad impact if exploited. Organizations relying on Incus for virtualization and container orchestration must consider this a critical security issue.

Mitigation Recommendations

The primary mitigation is to upgrade Incus to version 6.23.0 or later, where the authentication token validation flaw is fixed. Until upgrading, organizations should restrict access to localhost ports used by `incus webui` to trusted users only, using local firewall rules or network policies to prevent unauthorized local or remote access. Users should be educated to avoid clicking on suspicious URLs that could lead to interaction with the Incus web UI. Additionally, monitoring local network traffic and system logs for unusual access patterns to the Incus web server can help detect exploitation attempts. Implementing strict user privilege separation and minimizing the number of users who can run `incus webui` reduces the attack surface. Finally, consider isolating the management interface in secure environments or using alternative management tools that do not expose local web servers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-24T15:41:47.490Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5c16a3c064ed76fe46d11

Added to database: 3/26/2026, 11:29:46 PM

Last enriched: 3/26/2026, 11:45:12 PM

Last updated: 3/27/2026, 1:48:01 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses