Incus, Security Bypass, CVE-2024-XXXX (Critical)

Listen to this Post

How the CVE Works

The vulnerability occurs when Incus generates nftables rules for bridge-connected devices, bypassing MAC/IP filtering. Attackers can spoof MAC addresses to send unlimited DHCP requests, exhausting the pool and causing DoS. The rules incorrectly prioritize local service access (DHCP/DNS) over security filters, allowing unfiltered malicious traffic. DNS queries also bypass restrictions, enabling further exploitation.

DailyCVE Form

Platform: Incus
Version: v6.12-v6.13
Vulnerability: ACL Bypass
Severity: Critical
Date: 2024-XX-XX

Prediction: Patch by Q3 2024

What Undercode Say

iifname "br0" ether type ip ip saddr 0.0.0.0 udp dport 67 accept
iifname "br0" ether type ip6 ip6 saddr fe80::/10 udp dport 547 accept
for i in {0..99}; do ip link set address 10:66:6a:42:$i:00 dev eth0; dhclient -4; done

How Exploit

1. Spoof MAC/IPv6 addresses.

2. Flood DHCP requests.

3. Exhaust IP pool.

4. Bypass DNS restrictions.

Protection from this CVE

1. Disable affected ACLs.

2. Manual nftables rules.

3. Await patch.

Impact

  • DHCP exhaustion.
  • DNS spoofing.
  • Network DoS.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top