Description
A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.
Published: 2026-04-01
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Immediate Patch
AI Analysis

Impact

An attacker can join a Juju database cluster because the controller does not verify client certificates when a new node attempts to join. Once a node is accepted, the attacker has full read and write access to the database, allowing them to read confidential data, modify records, and potentially disrupt services. The weakness is an example of improper TLS authentication (CWE‑295) and failure to enforce authentication (CWE‑306).

Affected Systems

Canonical Juju versions from 3.2.0 through 3.6.19 and from 4.0 through 4.0.4 are affected. Versions prior to 3.2.0 and after 4.0.4 are not vulnerable according to the provided data.

Risk and Exploitability

With a CVSS score of 10, the vulnerability is rated as critical, but an EPSS score of less than 1% suggests a low current probability of exploitation. It is not listed in the CISA KEV catalog. The attack requires only network reachability to the controller’s Dqlite port, making it straightforward for an intruder on the same network or with access to an exposed port to exploit the flaw and gain complete control of the underlying database.

Generated by OpenCVE AI on April 2, 2026 at 23:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Juju to the latest released version that includes the TLS client authentication check (see the official advisory for the exact patch version).
  • Restrict network access to the Juju controller’s Dqlite port by configuring firewall rules or network segmentation to prevent exposure to untrusted networks.
  • Monitor cluster logs for unexpected peer join requests and remove any unauthorized nodes immediately.

Generated by OpenCVE AI on April 2, 2026 at 23:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gvrj-cjch-728p Juju has Improper TLS Client/Server authentication and certificate verification on Database Cluster
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical juju
CPEs cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical juju

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.
Title Improper TLS Client/Server authentication and certificate verification on Database Cluster
Weaknesses CWE-295
CWE-306
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-08T07:27:16.821Z

Reserved: 2026-03-18T08:46:09.947Z

Link: CVE-2026-4370

cve-icon Vulnrichment

Updated: 2026-04-01T13:00:43.615Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T09:16:17.717

Modified: 2026-04-02T20:24:48.797

Link: CVE-2026-4370

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:19:11Z

Weaknesses