NIXPKGS-2026-0938
GitHub issue
published on
Permalink
CVE-2026-4370
10.0 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package jujutsu
- @LeSuisse removed package jujuutils
- @LeSuisse accepted
- @LeSuisse published on GitHub
Improper TLS Client/Server authentication and certificate verification on Database Cluster
A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.
Affected products
juju
- <4.0.4
- <3.6.20
Matching in nixpkgs
Ignored packages (2)
pkgs.jujutsu
Git-compatible DVCS that is both simple and powerful
Package maintainers
-
@RealityAnomaly Alex Zero <alex@arctarus.co.uk>