EUVD-2026-21364

| CVE-2026-5412 CRITICAL
2026-04-10 canonical GHSA-w5fq-8965-c969
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Apr 10, 2026 - 12:45 vuln.today
EUVD ID Assigned
Apr 10, 2026 - 12:45 euvd
EUVD-2026-21364
Patch Released
Apr 10, 2026 - 12:45 nvd
Patch available
CVE Published
Apr 10, 2026 - 12:22 nvd
CRITICAL 9.9

Description

In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This allows a low-privileged user to access sensitive credentials. This issue is resolved in Juju versions 2.9.57 and 3.6.21.

Analysis

Authorization bypass in Canonical Juju Controller facade allows authenticated users to extract bootstrap cloud credentials via CloudSpec API. Affects Juju 2.9.0-2.9.56 and 3.6.0-3.6.20. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all Juju Controller deployments and identify instances running versions 2.9.0-2.9.56 or 3.6.0-3.6.20; audit recent API access logs for CloudSpec queries. Within 7 days: Apply vendor-released patches to all affected instances-upgrade to Juju 2.9.57 or 3.6.21 respectively; rotate all cloud provider credentials in affected environments. …

Sign in for detailed remediation steps.

Priority Score

50
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +50
POC: 0

Share

EUVD-2026-21364 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy