Incus, ACL Bypass Vulnerability, CVE-2024-XXXX (Critical)

Listen to this Post

How the CVE Works

The vulnerability occurs when Incus generates `nftables` rules for devices connected to a bridge. Rules accepting ct state established,related, ARP, and IPv6 Neighbor Discovery packets are placed at the top of the bridge input chain, bypassing MAC, IPv4, and IPv6 filtering rules. This allows an attacker to spoof ARP and Neighbor Advertisement packets, redirecting traffic intended for another VM/container to their own machine. The host’s ARP table is poisoned, and the attacker can fully impersonate the victim.

DailyCVE Form

Platform: Incus
Version: v6.12, v6.13
Vulnerability: ACL Bypass
Severity: Critical
Date: 2024-XX-XX

Prediction: Patch by Q3 2024

What Undercode Say

Check nftables rules
nft list ruleset
Monitor ARP changes
ip neigh monitor
Test ARP spoofing
arping -I eth0 <target_IP>

Exploit

1. Attacker changes VM IP to victim’s IP.

2. Floods host with ARP replies.

3. Host updates ARP table, redirecting victim’s traffic.

Protection from this CVE

  • Disable affected ACLs.
  • Manually enforce MAC/IP filtering.
  • Apply vendor patch when available.

Impact

  • ARP spoofing.
  • Full VM impersonation.
  • Network traffic hijacking.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top