EUVD-2026-12817

| CVE-2026-32692 HIGH
2026-03-18 canonical GHSA-89x7-5m5m-mcmm
7.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
Low

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 18, 2026 - 13:15 euvd
EUVD-2026-12817
Analysis Generated
Mar 18, 2026 - 13:15 vuln.today
CVE Published
Mar 18, 2026 - 12:35 nvd
HIGH 7.6

Description

An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end.

Analysis

An authorization bypass vulnerability exists in the Vault secrets back-end implementation of Canonical's Juju orchestration tool, allowing authenticated unit agents to perform unauthorized updates to secret revisions beyond their intended scope. Juju versions 3.1.6 through 3.6.18 are affected, and attackers with sufficient information can poison any existing secret revision within the Vault secret back-end scope. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Audit all Juju deployments to identify those using Vault as the secrets backend and document affected versions; notify relevant teams and escalate to infrastructure leadership. Within 7 days: Implement access controls to restrict unit agent permissions, disable Vault secret backend if not critical, and isolate affected Juju controller networks. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Vendor Status

Debian

juju
Release Status Fixed Version Urgency
(unstable) fixed (unfixed) -

Share

EUVD-2026-12817 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy