TROYANOSYVIRUS
Back to CVEs

CVE-2026-32694

MEDIUM
6.6

Description

In Juju from version 3.0.0 through 3.6.18, when a secret owner grants permissions to a secret to a grantee, the secret owner relies exclusively on a predictable XID of the secret to verify ownership. This allows a malicious grantee which can request secrets to predict past secrets granted by the same secret owner to different grantees, allowing them to use the resources granted by those past secrets. Successful exploitation relies on a very specific configuration, specific data semantic, and the administrator having the need to deploy at least two different applications, one of them controlled by the attacker.

CVE Details

CVSS v3.1 Score6.6
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredHIGH
User InteractionNONE
Published3/18/2026
Last Modified3/19/2026
Sourcenvd
Honeypot Sightings0

Affected Products

canonical:juju

Weaknesses (CWE)

CWE-343CWE-639

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.