CVE-2026-34179 PUBLISHED

Update of type field in restricted TLS certificate allows privilege escalation to cluster admin

Assigner: canonical
Reserved: 26.03.2026 Published: 09.04.2026 Updated: 09.04.2026

In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to cluster admin.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor Canonical
Product lxd
Versions Default: unaffected
  • affected from 4.12.0 to 5.0.7 (excl.)
  • affected from 5.1.0 to 5.21.5 (excl.)
  • affected from 6.0.0 to 6.8.0 (excl.)

Credits

  • Miha Purg finder

References

Problem Types

  • CWE-915 Improperly controlled modification of Dynamically-Determined object attributes CWE