Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 10 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Canonical
Canonical juju\/utils |
|
CPEs | cpe:2.3:a:canonical:juju\/utils:*:*:*:*:*:go:*:* | |
Vendors & Products |
Canonical
Canonical juju\/utils |
Tue, 01 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 01 Jul 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it. | |
Title | Key leakage in juju/utils certificates | |
Weaknesses | CWE-312 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-07-01T14:30:51.639Z
Reserved: 2025-06-18T08:48:41.677Z
Link: CVE-2025-6224

Updated: 2025-07-01T14:30:42.574Z

Status : Analyzed
Published: 2025-07-01T11:15:21.770
Modified: 2025-09-10T16:08:34.040
Link: CVE-2025-6224

No data.

No data.