CVE-2024-6107

Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.6 CRITICAL
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H
canonicalCNA
9.6 CRITICAL
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
VendorProductVersion
canonicalmetal_as_a_service
3.1.0 ≤
𝑥
< 3.1.4
canonicalmetal_as_a_service
3.2.0 ≤
𝑥
< 3.2.11
canonicalmetal_as_a_service
3.3.0 ≤
𝑥
< 3.3.8
canonicalmetal_as_a_service
3.4.0 ≤
𝑥
< 3.4.4
canonicalmetal_as_a_service
3.5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
maas
plucky
dne
oracular
dne
noble
dne
mantic
dne
jammy
dne
focal
needs-triage
bionic
needs-triage
xenial
needs-triage