<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Image-Poisoning — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/image-poisoning/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 17:08:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/image-poisoning/feed.xml" rel="self" type="application/rss+xml"/><item><title>Incus Image Cache Poisoning Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-incus-image-poisoning/</link><pubDate>Fri, 27 Mar 2026 17:08:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-incus-image-poisoning/</guid><description>A vulnerability exists in Incus where it does not properly verify the combined fingerprint when downloading images from simplestreams servers, allowing an attacker to perform image cache poisoning and potentially expose other tenants to running attacker-controlled images.</description><content:encoded><![CDATA[<p>A vulnerability in Incus allows for image cache poisoning when downloading images from simplestreams servers. The vulnerability stems from the lack of validation of the combined fingerprint of image files, potentially leading to a compromised image being served to other users. This issue affects Incus servers that have not configured <code>restricted.image.servers</code> or equivalent firewall rules, making them susceptible to this attack. An attacker with access to such an Incus environment can manipulate the image server to serve altered image files under the same fingerprint, poisoning the global image cache. This attack can be particularly effective on systems that frequently deploy new Incus instances, such as CI or build servers, allowing an attacker to inject malicious code into unsuspecting users&rsquo; instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to an Incus server that lacks <code>restricted.image.servers</code> configuration or equivalent network restrictions.</li>
<li>The attacker monitors the legitimate image server (<code>images.linuxcontainers.org</code>) for newly published images.</li>
<li>The attacker creates a compromised image with the same fingerprint as the legitimate image on an attacker-controlled server (<code>TESTSERVER</code>). This involves modifying the <code>rootfs.squashfs</code> file.</li>
<li>The attacker updates the <code>images.json</code> file on their server to reflect the changes made to the <code>rootfs.squashfs</code> file, including the new SHA256 hash and size.</li>
<li>The attacker configures their server to serve the modified image files and the updated <code>images.json</code> file over HTTPS.</li>
<li>The attacker waits for a target user on the vulnerable Incus server to request the legitimate image using <code>incus image copy</code>.</li>
<li>The vulnerable Incus server downloads the compromised image from the attacker-controlled server (<code>TESTSERVER</code>) due to the lack of combined fingerprint validation.</li>
<li>The next time the target user launches a new instance using the compromised image (e.g., <code>incus launch images:debian/trixie</code>), the attacker&rsquo;s injected code is executed.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to image cache poisoning, potentially affecting multiple users on the same Incus server. The attacker can inject malicious code into the compromised image, leading to arbitrary code execution within the user&rsquo;s Incus instances. The impact is most significant in multi-tenant environments where multiple users share the same Incus server, as a single compromised image can affect multiple users and their workloads.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement <code>restricted.image.servers</code> in project configuration to restrict image sources to trusted servers. This mitigates the risk of downloading images from attacker-controlled servers (reference: Overview).</li>
<li>Implement network restrictions through firewalling or an HTTP proxy server to prevent Incus servers from accessing untrusted image servers (reference: Overview).</li>
<li>Monitor network connections originating from Incus servers to detect connections to unauthorized or suspicious image servers using the <code>Detect Suspicious Incus Image Download</code> Sigma rule.</li>
<li>Deploy the <code>Detect Modified SquashFS Files</code> Sigma rule to identify instances using potentially tampered image files.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>incus</category><category>image-poisoning</category><category>simplestreams</category></item></channel></rss>