top of page
perceptive_background_267k.jpg

Incus is a system container and virtual machine manager. Incus instances have an option to provide credentials to systemd in the guest. For containers, this is …

Published:

26 maart 2026 om 23:00:00

Alert date:

27 maart 2026 om 01:02:24

Source:

nvd.nist.gov

Click to open the original link from this advisory

Cloud & Virtualization

Incus system container and virtual machine manager contains a path traversal vulnerability in systemd credential handling. Prior to version 6.23.0, attackers can exploit the systemd.credential configuration syntax to write files outside the intended credentials directory. By using path traversal sequences like '../../../../../../root/.bashrc' in configuration keys, attackers can write arbitrary files as root. This enables privilege escalation and denial of service attacks within container environments. The vulnerability is fixed in Incus version 6.23.0.

Technical details

Mitigation steps:

Affected products:

Incus

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page