CVE-2026-32692
Unauthorized update of out-of-scope Vault secrets
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end.
Una vulnerabilidad de omisión de autorización en la implementación del back-end de secretos de Vault de Juju versiones 3.1.6 a 3.6.18 permite a un agente de unidad autenticado realizar actualizaciones no autorizadas a las revisiones de secretos. Con información suficiente, un atacante puede envenenar cualquier revisión de secreto existente dentro del alcance de ese back-end de secretos de Vault.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2026-03-13 CVE Reserved
- 2026-03-18 CVE Published
- 2026-03-19 CVE Updated
- 2026-03-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-285: Improper Authorization
CAPEC
- CAPEC-233: Privilege Escalation
References (1)
| URL | Tag | Source |
|---|
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|---|---|
| https://github.com/juju/juju/security/advisories/GHSA-89x7-5m5m-mcmm | 2026-03-18 |
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Canonical Search vendor "Canonical" | Juju Search vendor "Canonical" for product "Juju" | >= 3.1.6 < 3.6.19 Search vendor "Canonical" for product "Juju" and version " >= 3.1.6 < 3.6.19" | - |
Affected
| ||||||
