CVE-2026-1237: CWE-672 Operation on a Resource after Expiration or Release in Canonical juju
Vulnerable cross-model authorization in juju. If a charm's cross-model permissions are revoked or expire, a malicious user who is able to update database records can mint an invalid macaroon that is incorrectly validated by the juju controller, enabling a charm to maintain otherwise revoked or expired permissions. This allows a charm to continue relating to another charm in a cross-model relation, and use their workload without their permission. No fix is available as of the time of writing.
AI Analysis
Technical Summary
CVE-2026-1237 is a vulnerability classified under CWE-672 (Operation on a Resource after Expiration or Release) and CWE-347 (Improper Verification of Cryptographic Signature) affecting Canonical's juju, a popular cloud and container orchestration tool. The issue arises from a flaw in juju's cross-model authorization mechanism. When a charm's cross-model permissions are revoked or expire, the system should prevent further access. However, due to improper validation, a malicious user who can update database records can mint an invalid macaroon token that the juju controller incorrectly accepts as valid. This allows the charm to maintain access to another charm's workload despite revoked permissions, effectively bypassing intended access controls. The vulnerability requires the attacker to have low-level privileges and the ability to modify database records, which implies some level of authenticated access. No user interaction is needed, but the attack complexity is high. The vulnerability affects confidentiality, integrity, and availability by enabling unauthorized access and potential misuse of workloads across models. As of the publication date, no patch or fix is available, and no known exploits have been reported in the wild. The CVSS 4.0 score is 2.1, reflecting low severity due to the complexity and privilege requirements.
Potential Impact
For European organizations, the impact of CVE-2026-1237 depends on their use of Canonical's juju platform for managing cloud or containerized workloads. Unauthorized charm access can lead to data leakage, unauthorized resource consumption, or disruption of services across related charms. Although the vulnerability is low severity, it undermines trust in cross-model authorization, potentially enabling lateral movement within cloud environments. Organizations relying on juju for critical infrastructure orchestration may face risks to confidentiality and integrity of workloads. The lack of a fix increases exposure time, necessitating heightened vigilance. The impact is more pronounced in environments with multiple interrelated charms and complex cross-model relations, common in large-scale deployments. European cloud providers, managed service providers, and enterprises using juju for multi-tenant or multi-model orchestration are particularly at risk.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls. First, restrict database record modification privileges strictly to trusted administrators and monitor for unauthorized changes. Implement robust auditing and alerting on database updates related to authorization tokens. Limit charm deployment and cross-model relations to trusted sources and minimize the number of charms with cross-model permissions. Employ network segmentation and access controls to reduce the attack surface for malicious users. Regularly review and revoke unnecessary permissions proactively. Consider isolating critical workloads to prevent unauthorized charm interactions. Engage with Canonical for updates and apply patches promptly once available. Additionally, conduct internal penetration testing focusing on juju authorization mechanisms to identify potential exploitation paths.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Finland
CVE-2026-1237: CWE-672 Operation on a Resource after Expiration or Release in Canonical juju
Description
Vulnerable cross-model authorization in juju. If a charm's cross-model permissions are revoked or expire, a malicious user who is able to update database records can mint an invalid macaroon that is incorrectly validated by the juju controller, enabling a charm to maintain otherwise revoked or expired permissions. This allows a charm to continue relating to another charm in a cross-model relation, and use their workload without their permission. No fix is available as of the time of writing.
AI-Powered Analysis
Technical Analysis
CVE-2026-1237 is a vulnerability classified under CWE-672 (Operation on a Resource after Expiration or Release) and CWE-347 (Improper Verification of Cryptographic Signature) affecting Canonical's juju, a popular cloud and container orchestration tool. The issue arises from a flaw in juju's cross-model authorization mechanism. When a charm's cross-model permissions are revoked or expire, the system should prevent further access. However, due to improper validation, a malicious user who can update database records can mint an invalid macaroon token that the juju controller incorrectly accepts as valid. This allows the charm to maintain access to another charm's workload despite revoked permissions, effectively bypassing intended access controls. The vulnerability requires the attacker to have low-level privileges and the ability to modify database records, which implies some level of authenticated access. No user interaction is needed, but the attack complexity is high. The vulnerability affects confidentiality, integrity, and availability by enabling unauthorized access and potential misuse of workloads across models. As of the publication date, no patch or fix is available, and no known exploits have been reported in the wild. The CVSS 4.0 score is 2.1, reflecting low severity due to the complexity and privilege requirements.
Potential Impact
For European organizations, the impact of CVE-2026-1237 depends on their use of Canonical's juju platform for managing cloud or containerized workloads. Unauthorized charm access can lead to data leakage, unauthorized resource consumption, or disruption of services across related charms. Although the vulnerability is low severity, it undermines trust in cross-model authorization, potentially enabling lateral movement within cloud environments. Organizations relying on juju for critical infrastructure orchestration may face risks to confidentiality and integrity of workloads. The lack of a fix increases exposure time, necessitating heightened vigilance. The impact is more pronounced in environments with multiple interrelated charms and complex cross-model relations, common in large-scale deployments. European cloud providers, managed service providers, and enterprises using juju for multi-tenant or multi-model orchestration are particularly at risk.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls. First, restrict database record modification privileges strictly to trusted administrators and monitor for unauthorized changes. Implement robust auditing and alerting on database updates related to authorization tokens. Limit charm deployment and cross-model relations to trusted sources and minimize the number of charms with cross-model permissions. Employ network segmentation and access controls to reduce the attack surface for malicious users. Regularly review and revoke unnecessary permissions proactively. Consider isolating critical workloads to prevent unauthorized charm interactions. Engage with Canonical for updates and apply patches promptly once available. Additionally, conduct internal penetration testing focusing on juju authorization mechanisms to identify potential exploitation paths.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- canonical
- Date Reserved
- 2026-01-20T16:56:24.051Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697a25d84623b1157ccf7646
Added to database: 1/28/2026, 3:06:00 PM
Last enriched: 1/28/2026, 3:20:15 PM
Last updated: 1/28/2026, 4:18:21 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61140: n/a
UnknownCVE-2025-69517: n/a
HighCVE-2025-57283: n/a
HighCVE-2025-70336: n/a
HighCVE-2026-23830: CWE-94: Improper Control of Generation of Code ('Code Injection') in nyariv SandboxJS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.