Privilege Escalation in Canonical LXD Due to Inadequate Validation
CVE-2026-34179

9.1CRITICAL

Key Information:

Vendor

Canonical

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-34179?

A security issue in Canonical LXD versions 4.12 to 6.7 exists in the doCertificateUpdate function. This vulnerability arises from improper validation of the Type field when processing PUT/PATCH requests to /1.0/certificates/{fingerprint} for users with restricted TLS certificate access. An attacker who is remotely authenticated can exploit this flaw to escalate their privileges to that of a cluster admin, potentially compromising the security of the LXD environment.

Affected Version(s)

lxd Linux 4.12.0 < 5.0.7

lxd Linux 5.1.0 < 5.21.5

lxd Linux 6.0.0 < 6.8.0

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Miha Purg
.