Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6212-1 | incus security update |
Debian DSA |
DSA-6213-1 | lxd security update |
Github GHSA |
GHSA-c3h3-89qf-jqm5 | LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin |
Wed, 22 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:canonical:lxd:*:*:*:*:*:*:*:* |
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical lxd |
|
| Vendors & Products |
Canonical
Canonical lxd |
Thu, 09 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to cluster admin. | |
| Title | Update of type field in restricted TLS certificate allows privilege escalation to cluster admin | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-09T11:54:18.487Z
Reserved: 2026-03-26T09:24:08.449Z
Link: CVE-2026-34179
Updated: 2026-04-09T11:54:09.651Z
Status : Analyzed
Published: 2026-04-09T10:16:21.963
Modified: 2026-04-22T20:51:25.340
Link: CVE-2026-34179
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:33:01Z
Debian DSA
Github GHSA