Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-33945 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in **Incus** (LXC manager). Attackers use crafted config keys to write outside the `credentials` directory. πŸ’₯ **Consequences**: Privilege Escalation & Denial of Service (DoS).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory. The flaw lies in insufficient validation of configuration keys, allowing directory traversal sequences to escape the intended sandbox.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: LXC. **Product**: Incus. **Affected**: Versions **prior to 6.23.0**. If you are running 6.22.x or earlier, you are at risk! πŸ“… Published: 2026-03-26.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Impact**: High! CVSS Vector indicates **Complete** impact on Confidentiality, Integrity, and Availability. Hackers can potentially escalate privileges to root and disrupt services via DoS.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: Medium. Requires **Low Privileges** (PR:L) and **Low Complexity** (AC:L). No user interaction needed (UI:N). Network accessible (AV:N). You need some access to set config keys.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Exploit Status**: No public PoC listed in the data (`pocs: []`). However, the advisory is confirmed via GitHub GHSA. Wild exploitation is likely imminent given the low barrier to entry.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Incus versions < 6.23.0. Check if configuration keys allow directory traversal characters (`../`). Monitor for unauthorized file writes outside the `credentials` directory.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: Yes! Upgrade to **Incus 6.23.0** or later. Official advisory available at: `https://github.com/lxc/incus/security/advisories/GHSA-q4q8-7f2j-9h9f`.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, restrict network access to the Incus API. Strictly validate and sanitize all configuration inputs. Limit user privileges to prevent config modification.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. High CVSS score + Network Access + Low Auth Requirement = Urgent patching required. Do not ignore this! πŸƒβ€β™‚οΈπŸ’¨