Untriaged
Permalink
CVE-2026-4370
10.0 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Improper TLS Client/Server authentication and certificate verification on Database Cluster
A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.
Affected products
juju
- <3.6.20
- <4.0.4
Package maintainers
-
@RealityAnomaly Alex Zero <alex@arctarus.co.uk>
-
@0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev>
-
@bbigras Bruno Bigras <bigras.bruno@gmail.com>
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>
-
@emilazy Emily <nixpkgs@emily.moe>