Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-28384

CVE-2026-28384: Canonical LXD RCE Vulnerability

CVE-2026-28384 is a remote code execution flaw in Canonical LXD caused by improper sanitization that allows authenticated users to execute commands as the LXD daemon. This article covers technical details, affected versions, and mitigation.

Published: March 13, 2026

CVE-2026-28384 Overview

CVE-2026-28384 is a critical command injection vulnerability in Canonical LXD that allows an authenticated, unprivileged user to execute arbitrary commands as the LXD daemon on the LXD server. The vulnerability exists due to improper sanitization of the compression_algorithm parameter when making API calls to the image and backup endpoints. Successful exploitation enables an attacker with low-level access to escalate privileges and execute commands with the elevated permissions of the LXD daemon process.

Critical Impact

An authenticated attacker can achieve remote code execution on the LXD server by exploiting improper input sanitization in the compression algorithm parameter, potentially compromising the entire container infrastructure.

Affected Products

  • Canonical LXD versions 4.12 through 6.6
  • LXD snap versions prior to 5.0.6-e49d9f4 (channel 5.0/stable)
  • LXD snap versions prior to 5.21.4-1374f39 (channel 5.21/stable)
  • LXD snap versions prior to 6.7-1f11451 (channel 6.0/stable)

Discovery Timeline

  • 2026-03-12 - CVE-2026-28384 published to NVD
  • 2026-03-12 - Last updated in NVD database

Technical Details for CVE-2026-28384

Vulnerability Analysis

This vulnerability is classified as CWE-78 (OS Command Injection), a severe weakness that occurs when an application constructs OS commands using untrusted input without proper validation or sanitization. In the case of CVE-2026-28384, the LXD daemon fails to adequately validate the compression_algorithm parameter before using it in command execution contexts within the image and backup processing endpoints.

The vulnerability is accessible over the network and requires low attack complexity. While authentication is required, the privileges needed are minimal—an unprivileged authenticated user can exploit this flaw. The impact extends beyond the vulnerable component itself, potentially compromising the confidentiality, integrity, and availability of the host system and other containers managed by the LXD instance.

Root Cause

The root cause of CVE-2026-28384 lies in the absence of proper input validation for the compression_algorithm parameter in the LXD API handlers. The parameter was being passed directly to shell commands without sanitization, allowing attackers to inject malicious command sequences. The fix introduces proper validation by importing and utilizing the validate package from github.com/canonical/lxd/shared/validate to ensure the compression algorithm conforms to expected values before processing.

Attack Vector

An authenticated attacker with access to the LXD API can craft malicious requests to either the image or backup endpoints, injecting shell commands through the compression_algorithm parameter. Since LXD typically runs with elevated privileges to manage containers and system resources, successful command injection results in code execution with daemon-level permissions. This could allow an attacker to escape container isolation, access sensitive data, pivot to other systems, or completely compromise the LXD host.

The attack can be performed remotely over the network against any LXD instance exposing its API, making this particularly dangerous in multi-tenant environments or deployments where containers are managed by multiple users with varying trust levels.

go
// Security patch introducing validation in lxd/images.go
// Source: https://github.com/canonical/lxd/commit/043696a13171ace7dd4c2b32d34ce039ab629052

 	"github.com/canonical/lxd/shared/ioprogress"
 	"github.com/canonical/lxd/shared/logger"
 	"github.com/canonical/lxd/shared/osarch"
+	"github.com/canonical/lxd/shared/validate"
 	"github.com/canonical/lxd/shared/version"
 )
go
// Security patch introducing validation in lxd/instance_backup.go
// Source: https://github.com/canonical/lxd/commit/043696a13171ace7dd4c2b32d34ce039ab629052

 	"github.com/canonical/lxd/shared"
 	"github.com/canonical/lxd/shared/api"
 	"github.com/canonical/lxd/shared/entity"
+	"github.com/canonical/lxd/shared/validate"
 	"github.com/canonical/lxd/shared/version"
 )

Detection Methods for CVE-2026-28384

Indicators of Compromise

  • Unusual API requests to /1.0/images or backup endpoints containing special characters (;, |, &, $, backticks) in the compression_algorithm parameter
  • Unexpected child processes spawned by the LXD daemon process
  • Anomalous system commands executed with LXD daemon privileges
  • Evidence of container escape or unauthorized access to host resources

Detection Strategies

  • Implement API request logging and monitor for malformed or suspicious compression_algorithm values
  • Configure SIEM rules to alert on command injection patterns in LXD API traffic
  • Deploy runtime application self-protection (RASP) to detect and block command injection attempts
  • Monitor LXD daemon process trees for unexpected shell command execution

Monitoring Recommendations

  • Enable verbose logging for LXD API endpoints and review logs for injection attempts
  • Implement network-level monitoring for LXD API traffic to detect malicious payloads
  • Set up file integrity monitoring on LXD binaries and configuration files
  • Monitor for privilege escalation attempts from container contexts to the host

How to Mitigate CVE-2026-28384

Immediate Actions Required

  • Update LXD to patched versions: 5.0.6-e49d9f4 (5.0/stable), 5.21.4-1374f39 (5.21/stable), or 6.7-1f11451 (6.0/stable)
  • Review LXD access controls and remove unnecessary user permissions
  • Audit recent API access logs for potential exploitation attempts
  • Restrict network access to the LXD API to trusted sources only

Patch Information

Canonical has released security patches addressing this vulnerability across multiple LXD release channels. The fixes introduce proper validation of the compression_algorithm parameter using the validate package before the value is used in command execution contexts. Administrators should update to the following fixed versions:

  • Channel 5.0/stable: Version 5.0.6-e49d9f4
  • Channel 5.21/stable: Version 5.21.4-1374f39
  • Channel 6.0/stable: Version 6.7-1f11451

Note that channel 4.0/stable (version 4.0.10) is not affected by this vulnerability. For detailed patch information, refer to the Ubuntu LXD Remote Code Execution Fixes announcement and the GitHub Security Advisory GHSA-4rmf-rcp8-2r9g.

Workarounds

  • Limit LXD API access to only trusted administrators until patches can be applied
  • Implement network segmentation to isolate LXD management interfaces
  • Use a web application firewall (WAF) or API gateway to filter potentially malicious input patterns
  • Disable remote API access if not required and manage LXD locally only
bash
# Verify current LXD version
snap info lxd | grep installed

# Update LXD to the latest patched version
sudo snap refresh lxd --channel=6.0/stable

# Restrict LXD remote access (if not needed)
lxc config set core.https_address ""

# Review current LXD users and their permissions
lxc config trust list

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechLxd

  • SeverityCRITICAL

  • CVSS Score9.4

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-78
  • Technical References
  • Ubuntu LXD Remote Code Execution Fixes

  • Canonical LXD Commit Update

  • Canonical LXD Commit Fix

  • Canonical LXD Commit Patch

  • GitHub Security Advisory GHSA-4rmf-rcp8-2r9g
  • Related CVEs
  • CVE-2026-34177: Canonical LXD Privilege Escalation Flaw

  • CVE-2026-34179: Canonical LXD Privilege Escalation Flaw

  • CVE-2026-34178: Canonical LXD Auth Bypass Vulnerability

  • CVE-2026-3351: Canonical LXD Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English