Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://bugs.launchpad.net/maas/+bug/2069094 |
![]() ![]() |
History
Tue, 22 Jul 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Canonical
Canonical maas |
|
Vendors & Products |
Canonical
Canonical maas |
Mon, 21 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 21 Jul 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps. | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-07-21T17:07:16.633Z
Reserved: 2024-06-18T00:31:47.270Z
Link: CVE-2024-6107

Updated: 2025-07-21T17:06:52.238Z

Status : Awaiting Analysis
Published: 2025-07-21T09:15:23.970
Modified: 2025-07-22T13:06:07.260
Link: CVE-2024-6107

No data.