{"api_version":"1","generated_at":"2026-05-11T23:36:28+00:00","cve":"CVE-2026-41685","urls":{"html":"https://cve.report/CVE-2026-41685","api":"https://cve.report/api/cve/CVE-2026-41685.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-41685","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-41685"},"summary":{"title":"Incus: Unbounded binary import disk exhaustion","description":"Incus is a system container and virtual machine manager. Prior to version 7.0.0, uploads of large amount of data by authenticated users can run the Incus server out of disk space, potentially taking down the host system. The impact here is limited for anyone using storage.images_volume and storage.backups_volume as those users will have large uploads be stored on those volumes rather than directly on the host filesystem. This is the default behavior on IncusOS. This issue has been patched in version 7.0.0.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-07 14:16:03","updated_at":"2026-05-07 19:50:49"},"problem_types":["CWE-770","CWE-770 CWE-770: Allocation of Resources Without Limits or Throttling"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}}],"references":[{"url":"https://github.com/lxc/incus/releases/tag/v7.0.0","name":"https://github.com/lxc/incus/releases/tag/v7.0.0","refsource":"security-advisories@github.com","tags":["Patch","Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/lxc/incus/security/advisories/GHSA-98vh-x9cx-9cfp","name":"https://github.com/lxc/incus/security/advisories/GHSA-98vh-x9cx-9cfp","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-41685","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41685","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"lxc","product":"incus","version":"affected < 7.0.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"41685","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxcontainers","cpe5":"incus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"41685","cve":"CVE-2026-41685","epss":"0.000410000","percentile":"0.123400000","score_date":"2026-05-10","updated_at":"2026-05-11 00:14:42"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-41685","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-05-07T13:49:59.602172Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-05-07T13:50:17.247Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/lxc/incus/security/advisories/GHSA-98vh-x9cx-9cfp"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"incus","vendor":"lxc","versions":[{"status":"affected","version":"< 7.0.0"}]}],"descriptions":[{"lang":"en","value":"Incus is a system container and virtual machine manager. Prior to version 7.0.0, uploads of large amount of data by authenticated users can run the Incus server out of disk space, potentially taking down the host system. The impact here is limited for anyone using storage.images_volume and storage.backups_volume as those users will have large uploads be stored on those volumes rather than directly on the host filesystem. This is the default behavior on IncusOS. This issue has been patched in version 7.0.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-770","description":"CWE-770: Allocation of Resources Without Limits or Throttling","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-07T13:09:34.982Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/lxc/incus/security/advisories/GHSA-98vh-x9cx-9cfp","tags":["x_refsource_CONFIRM"],"url":"https://github.com/lxc/incus/security/advisories/GHSA-98vh-x9cx-9cfp"},{"name":"https://github.com/lxc/incus/releases/tag/v7.0.0","tags":["x_refsource_MISC"],"url":"https://github.com/lxc/incus/releases/tag/v7.0.0"}],"source":{"advisory":"GHSA-98vh-x9cx-9cfp","discovery":"UNKNOWN"},"title":"Incus: Unbounded binary import disk exhaustion"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-41685","datePublished":"2026-05-07T13:09:34.982Z","dateReserved":"2026-04-22T03:53:24.406Z","dateUpdated":"2026-05-07T13:50:17.247Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-07 14:16:03","lastModifiedDate":"2026-05-07 19:50:49","problem_types":["CWE-770","CWE-770 CWE-770: Allocation of Resources Without Limits or Throttling"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxcontainers:incus:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0.0","matchCriteriaId":"CF8EBB4B-C1F0-44C5-B063-9CF8EB6E0972"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"41685","Ordinal":"1","Title":"Incus: Unbounded binary import disk exhaustion","CVE":"CVE-2026-41685","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"41685","Ordinal":"1","NoteData":"Incus is a system container and virtual machine manager. Prior to version 7.0.0, uploads of large amount of data by authenticated users can run the Incus server out of disk space, potentially taking down the host system. The impact here is limited for anyone using storage.images_volume and storage.backups_volume as those users will have large uploads be stored on those volumes rather than directly on the host filesystem. This is the default behavior on IncusOS. This issue has been patched in version 7.0.0.","Type":"Description","Title":"Incus: Unbounded binary import disk exhaustion"}]}}}