Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19114 | Incus creates nftables rules that partially bypass security options |
Github GHSA |
GHSA-p7fw-vjjm-2rwp | Incus creates nftables rules that partially bypass security options |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 25 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Jun 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue. | |
| Title | Incus vulnerable to antispoofing nftables firewall rule bypass on bridge networks with ACLs | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-25T17:54:01.093Z
Reserved: 2025-06-20T17:42:25.709Z
Link: CVE-2025-52890
Updated: 2025-06-25T17:53:53.867Z
Status : Deferred
Published: 2025-06-25T17:15:39.370
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-52890
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA