CVE-2025-52890

Publication date 25 June 2025

Last updated 25 June 2025


Ubuntu priority

Cvss 3 Severity Score

8.1 · High

Score breakdown

Description

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.

Status

Package Ubuntu Release Status
incus 25.10 questing
Needs evaluation
25.04 plucky
Needs evaluation
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble
Needs evaluation
22.04 LTS jammy Not in release

Severity score breakdown

Parameter Value
Base score 8.1 · High
Attack vector Adjacent
Attack complexity Low
Privileges required High
User interaction None
Scope Changed
Confidentiality High
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H