Vulnerability Details CVE-2026-34179
In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to cluster admin.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 30.1%
CVSS Severity
CVSS v3 Score 9.1
Products affected by CVE-2026-34179
-
cpe:2.3:a:canonical:lxd:4.12
-
cpe:2.3:a:canonical:lxd:4.13
-
cpe:2.3:a:canonical:lxd:4.14
-
cpe:2.3:a:canonical:lxd:4.15
-
cpe:2.3:a:canonical:lxd:4.16
-
cpe:2.3:a:canonical:lxd:4.17
-
cpe:2.3:a:canonical:lxd:4.18
-
cpe:2.3:a:canonical:lxd:4.19
-
cpe:2.3:a:canonical:lxd:4.20
-
cpe:2.3:a:canonical:lxd:4.21
-
cpe:2.3:a:canonical:lxd:4.22
-
cpe:2.3:a:canonical:lxd:4.23
-
cpe:2.3:a:canonical:lxd:4.24
-
cpe:2.3:a:canonical:lxd:5.0.0
-
cpe:2.3:a:canonical:lxd:5.0.1
-
cpe:2.3:a:canonical:lxd:5.0.2
-
cpe:2.3:a:canonical:lxd:5.0.3
-
cpe:2.3:a:canonical:lxd:5.0.4
-
cpe:2.3:a:canonical:lxd:5.0.5
-
cpe:2.3:a:canonical:lxd:5.21.0
-
cpe:2.3:a:canonical:lxd:5.21.1
-
cpe:2.3:a:canonical:lxd:5.21.2
-
cpe:2.3:a:canonical:lxd:5.21.3
-
cpe:2.3:a:canonical:lxd:5.21.4
-
cpe:2.3:a:canonical:lxd:6.0
-
cpe:2.3:a:canonical:lxd:6.1
-
cpe:2.3:a:canonical:lxd:6.2
-
cpe:2.3:a:canonical:lxd:6.3
-
cpe:2.3:a:canonical:lxd:6.4
-
cpe:2.3:a:canonical:lxd:6.5