Arbitrary Binary Upload Vulnerability in Juju by Canonical
CVE-2025-0928
8.8HIGH
What is CVE-2025-0928?
In certain versions of the Juju orchestration tool, authenticated controller users could upload arbitrary agent binaries to any model or the controller itself. This loophole allowed for the potential distribution of malicious binaries to various systems, which could lead to unauthorized remote code execution. The vulnerability arises from a lack of verification on model membership and permission checks, enabling attackers to exploit this weakness effectively.
Affected Version(s)
Juju Linux 2.0.0 < 2.9.52
Juju Linux 3.0.0 < 3.6.8
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
