CVE-2025-0928

| EUVD-2025-20665 HIGH
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 16, 2026 - 04:21 euvd
EUVD-2025-20665
Analysis Generated
Mar 16, 2026 - 04:21 vuln.today
PoC Detected
Jan 08, 2026 - 11:51 vuln.today
Public exploit code
CVE Published
Jul 08, 2025 - 18:15 nvd
HIGH 8.8

Description

In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.

Analysis

In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.

Technical Context

Remote code execution allows an attacker to run arbitrary commands or code on the target system over a network without prior authentication. This vulnerability is classified as Improper Authorization (CWE-285).

Affected Products

Affected products: Canonical Juju

Remediation

Apply vendor patches immediately. Restrict network access to vulnerable services. Implement network segmentation and monitoring for anomalous activity.

Priority Score

65
Low Medium High Critical
KEV: 0
EPSS: +0.7
CVSS: +44
POC: +20

Vendor Status

Ubuntu

Priority: High
juju
Release Status Version
jammy DNE -
noble DNE -
plucky DNE -
upstream released 2.9.52, 3.6.8

Debian

juju
Release Status Fixed Version Urgency
(unstable) fixed (unfixed) -

Share

CVE-2025-0928 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy