Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://bugs.launchpad.net/maas/+bug/2069094 |
|
History
Wed, 27 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical metal As A Service
|
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:canonical:metal_as_a_service:*:*:*:*:*:*:*:* cpe:2.3:a:canonical:metal_as_a_service:3.5.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Canonical metal As A Service
|
Tue, 22 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical maas |
|
| Vendors & Products |
Canonical
Canonical maas |
Mon, 21 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 21 Jul 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps. | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published: 2025-07-21T08:52:56.608Z
Updated: 2025-07-21T17:07:16.633Z
Reserved: 2024-06-18T00:31:47.270Z
Link: CVE-2024-6107
Updated: 2025-07-21T17:06:52.238Z
Status : Analyzed
Published: 2025-07-21T09:15:23.970
Modified: 2025-08-27T14:30:39.730
Link: CVE-2024-6107
No data.
ReportizFlow