CVE-2026-5412
Authorization Bypass in Juju Controller Exposes Cloud Credentials
Publication date: 2026-04-10
Last updated on: 2026-04-30
Assigner: Canonical Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| canonical | juju | to 2.9.57 (exc) |
| canonical | juju | From 3.6 (inc) to 3.6.21 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-5412 is a critical authorization vulnerability in Juju versions prior to 2.9.57 and 3.6.21. It allows an authenticated user with low privileges to call the CloudSpec API method on the Controller facade and extract sensitive cloud credentials used to bootstrap the controller.
The root cause is improper authorization where access to credential details is not restricted to controller superusers or model admins, allowing unauthorized disclosure of highly sensitive information.
This means that users who only have login permission and know the controller model UUID can retrieve confidential credentials that should only be accessible to high-privileged users.
How can this vulnerability impact me? :
This vulnerability can have severe impacts because it allows low-privileged users to access highly sensitive cloud credentials.
With these credentials, an attacker could potentially compromise the confidentiality, integrity, and availability of the cloud environment managed by Juju.
The CVSS v3.1 base score is 9.9, indicating critical severity with network attack vector, low attack complexity, and no user interaction required.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves unauthorized access to the CloudSpec API method on the Juju controller facade, which can be invoked by authenticated users with minimal permissions if they know the controller model UUID.
Detection can focus on monitoring access to the controller API port 17070, as this is the port used by the controller service and Juju CLI clients.
You can detect suspicious activity by checking for unexpected or unauthorized calls to the CloudSpec API or unusual access patterns on port 17070.
- Use network monitoring tools (e.g., tcpdump, Wireshark) to capture traffic on port 17070 and analyze for unauthorized API calls.
- On the controller machine, use commands like `netstat -tulnp | grep 17070` or `ss -tulnp | grep 17070` to verify which processes are listening on the API port.
- Review Juju controller logs for API calls to CloudSpec methods by users without superuser or model admin privileges.
- Audit user permissions and check for any low-privileged users accessing sensitive credential information.
What immediate steps should I take to mitigate this vulnerability?
The primary immediate mitigation is to restrict network ingress to the Juju controller API port 17070 on all controller machines or the controller service in Kubernetes deployments.
This restriction should be balanced with the need for legitimate Juju CLI and client access to this port.
Additionally, ensure that only trusted users have access to the controller and that user permissions are properly managed to prevent low-privileged users from invoking the CloudSpec API.
Upgrade Juju to versions 2.9.57 or 3.6.21 (or later) as soon as patches become available, since these versions include fixes that restrict CloudSpec API credentials visibility exclusively to admin users.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows low-privileged authenticated users to extract sensitive cloud credentials used to bootstrap the Juju controller. Such unauthorized disclosure of sensitive credentials can lead to breaches of confidentiality and unauthorized access to cloud resources.
Because the vulnerability exposes highly sensitive information due to improper authorization controls, it can negatively impact compliance with common standards and regulations such as GDPR and HIPAA, which require strict protection of sensitive data and credentials.
Organizations using affected Juju versions may face increased risk of data breaches or unauthorized access, potentially leading to violations of data protection and security requirements mandated by these regulations.