CVE-2026-5412

Canonical · Juju

Juju contains an authorization flaw in the Controller facade that allows authenticated users to extract sensitive cloud credentials.

Executive summary

A critical authorization vulnerability in Juju allows low-privileged authenticated users to access sensitive cloud credentials, leading to potential full infrastructure compromise.

Vulnerability

This is an authorization issue in the Controller facade. An authenticated user can invoke the CloudSpec API method to retrieve highly sensitive cloud bootstrap credentials.

Business impact

With a CVSS score of 9.9, the impact is severe. An attacker with even low-level access can steal credentials to control the entire underlying cloud environment, leading to massive data breaches and unauthorized manipulation of cloud infrastructure.

Remediation

Immediate Action: Upgrade Juju to versions 2.9.57 or 3.6.21 or later.

Proactive Monitoring: Review Juju controller access logs for unusual calls to the CloudSpec API method by non-privileged accounts.

Compensating Controls: Implement the principle of least privilege for all Juju users and rotate cloud credentials immediately if unauthorized access is suspected.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The severity of this credential exposure issue demands an immediate upgrade. Organizations should also rotate any credentials that may have been exposed as a precautionary measure.