Impact
A compromised workload machine under a Juju controller can read any log file for any entity in any model, bypassing normal access controls. This allows an attacker to retrieve sensitive operational information from controller logs, potentially exposing configuration details, credentials, or internal audit data. The vulnerability corresponds to missing access control checks, as categorized by CWE-863.
Affected Systems
Juju versions 2.9 through 2.9.55 and 3.6 through 3.6.18 are vulnerable. The issue was fixed in versions 2.9.56 and 3.6.19, and later releases.
Risk and Exploitability
With a CVSS score of 6.9 the risk is moderate. Exploitation requires the attacker to already have control over a workload machine connected to the controller, so it is a local compromise scenario. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, indicating no confirmed widespread exploitation yet. Nonetheless, the moderate severity combined with potential for sensitive data exposure warrants prompt action.
OpenCVE Enrichment
Github GHSA