CVE-2026-4370 PUBLISHED

Improper TLS Client/Server authentication and certificate verification on Database Cluster

Assigner: canonical
Reserved: 18.03.2026 Published: 01.04.2026 Updated: 01.04.2026

A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 10

Product Status

Vendor Canonical
Product Juju
Versions Default: unaffected
  • affected from 3.2.0 to 3.6.20 (excl.)
  • affected from 4.0 to 4.0.4 (excl.)

Credits

  • Harry Pidcock finder
  • Joseph Phillips remediation developer
  • Ian Booth coordinator

References

Problem Types

  • CWE-295 Improper certificate validation CWE
  • CWE-306 Missing authentication for critical function CWE

Impacts

  • CAPEC-115 Authentication Bypass
  • CAPEC-94 Adversary in the Middle (AiTM)