CVE-2026-4370
Received Received - Intake
Improper TLS Authentication in Juju Dqlite Enables Unauthorized Access

Publication date: 2026-04-01

Last updated on: 2026-04-02

Assigner: Canonical Ltd.

Description
A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
canonical juju From 3.2.0 (inc) to 3.6.20 (exc)
canonical juju From 4.0 (inc) to 4.0.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-295 The product does not validate, or incorrectly validates, a certificate.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-4370 is a critical security vulnerability in Juju controllers (versions 3.2.0 to 3.6.19 and 4.0 to 4.0.4) related to improper TLS client and server authentication within the internal Dqlite database cluster.

Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. This means an attacker with network access to the Juju controller's Dqlite port can join the database cluster without proper authentication.

Once the attacker joins the cluster, they gain full read and write access to the underlying database, allowing them to read, modify data, escalate privileges, and compromise the entire cluster.


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated attacker with network access to the Juju controller's Dqlite port to join the database cluster as a rogue member.

The attacker can then read and modify all cluster data, including sensitive user information, escalate privileges, and potentially open firewall ports.

This leads to total data compromise within the Juju controller's database cluster, severely impacting the confidentiality, integrity, and availability of your system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring network traffic to the Juju controller's Dqlite cluster port (default port 17666) for unauthorized or unexpected connections, as the flaw allows unauthenticated attackers to join the cluster.

A practical detection method involves checking for any unknown clients connecting to port 17666 on the Juju controller, which should normally only accept connections from trusted controller IPs.

While no specific detection commands are provided, network administrators can use tools like netstat, ss, or tcpdump to monitor connections on port 17666. For example:

  • netstat -an | grep 17666
  • ss -tnlp | grep 17666
  • tcpdump -i <interface> port 17666

Additionally, reviewing Juju controller logs for unexpected cluster join events or anomalies may help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The primary and recommended mitigation is to upgrade Juju to patched versions 3.6.20 or 4.0.5 or later, where the TLS authentication flaw is fixed.

If immediate patching is not possible, temporary mitigations include:

  • Restrict network access to port 17666 so that only trusted Juju controller IP addresses can connect.
  • Disable High Availability (HA) by reducing to a single Juju controller and blocking all incoming and outgoing connections on port 17666.

These mitigations reduce exposure but do not fix the underlying TLS verification flaw, so upgrading remains essential.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an unauthenticated attacker to join the Juju controller's internal Dqlite database cluster and gain full read and write access to sensitive data, including user information. Such unauthorized access and potential data modification represent a severe security breach.

Because the attacker can compromise the confidentiality, integrity, and availability of data, this flaw could lead to violations of common data protection standards and regulations such as GDPR and HIPAA, which require strict controls over access to sensitive personal and health information.

Failure to properly authenticate and secure access to critical databases may result in non-compliance with these regulations, potentially leading to legal penalties, loss of trust, and damage to organizational reputation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart