CVE-2026-5412
Canonical · Juju
Juju contains an authorization flaw in the Controller facade that allows authenticated users to extract sensitive cloud credentials.
Executive summary
A critical authorization vulnerability in Juju allows low-privileged authenticated users to access sensitive cloud credentials, leading to potential full infrastructure compromise.
Vulnerability
This is an authorization issue in the Controller facade. An authenticated user can invoke the CloudSpec API method to retrieve highly sensitive cloud bootstrap credentials.
Business impact
With a CVSS score of 9.9, the impact is severe. An attacker with even low-level access can steal credentials to control the entire underlying cloud environment, leading to massive data breaches and unauthorized manipulation of cloud infrastructure.
Remediation
Immediate Action: Upgrade Juju to versions 2.9.57 or 3.6.21 or later.
Proactive Monitoring: Review Juju controller access logs for unusual calls to the CloudSpec API method by non-privileged accounts.
Compensating Controls: Implement the principle of least privilege for all Juju users and rotate cloud credentials immediately if unauthorized access is suspected.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The severity of this credential exposure issue demands an immediate upgrade. Organizations should also rotate any credentials that may have been exposed as a precautionary measure.