CVE-2024-6107

EUVD-2024-54803
Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.6 CRITICAL
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H
canonicalCNA
9.6 CRITICAL
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
Affected Products (NVD)
VendorProductVersion
canonicalmetal_as_a_service
3.1.0 ≤
𝑥
< 3.1.4
canonicalmetal_as_a_service
3.2.0 ≤
𝑥
< 3.2.11
canonicalmetal_as_a_service
3.3.0 ≤
𝑥
< 3.3.8
canonicalmetal_as_a_service
3.4.0 ≤
𝑥
< 3.4.4
canonicalmetal_as_a_service
3.5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
maas
bionic
needs-triage
focal
needs-triage
jammy
dne
mantic
dne
noble
dne
oracular
dne
plucky
dne
questing
dne
xenial
needs-triage