Cyber Posture

CVE-2025-0928

HighPublic PoC

Published: 08 July 2025

Published
08 July 2025
Modified
08 January 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0232 84.9th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0928 is a high-severity Improper Authorization (CWE-285) vulnerability in Canonical Juju. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-5 (Access Restrictions for Change).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to upload agent binaries to models and controllers, directly preventing unauthorized distribution due to improper model membership and permission checks.

prevent

Restricts and manages access by authenticated users to perform changes such as binary uploads, mitigating the ability of low-privilege controller users to poison binaries across models.

prevent

Requires verification of component authenticity for agent binaries prior to installation or execution on new or upgrading machines, blocking poisoned binaries from remote code execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

Vuln in exposed Juju controller allows unauthorized malicious binary upload (CWE-434/285) that gets distributed and executed for RCE, directly enabling T1190 exploitation and T1105 ingress transfer.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of…

more

poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.

Deeper analysisAI

CVE-2025-0928 is a high-severity vulnerability in Juju, an open-source orchestration engine for cloud-native infrastructure, affecting versions prior to 3.6.8 and 2.9.52. It stems from improper authorization (CWE-285) and unrestricted upload of dangerous file types (CWE-434), allowing any authenticated controller user to upload arbitrary agent binaries to any model or the controller itself without model membership verification or explicit permissions. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating significant risk due to its network accessibility and low complexity.

An attacker with low-privilege authenticated access to the Juju controller can exploit this flaw to upload malicious agent binaries, which are then distributed to new or upgrading machines across models. This enables remote code execution on victim machines, as the poisoned binaries execute with the privileges of the deployed agents, potentially compromising entire models or the controller.

The official GitHub security advisory (GHSA-4vc8-wvhw-m5gv) addresses mitigation by recommending immediate upgrades to Juju 3.6.8 or 2.9.52, where upload operations now enforce proper model membership checks and permission requirements to prevent unauthorized binary distribution.

Details

CWE(s)

Affected Products

canonical
juju
≤ 2.9.52 · 3.0 — 3.6.8

CVEs Like This One

CVE-2026-5412Same product: Canonical Juju
CVE-2026-4370Same product: Canonical Juju
CVE-2026-32692Same product: Canonical Juju
CVE-2025-53513Same product: Canonical Juju
CVE-2026-32693Same product: Canonical Juju
CVE-2026-34178Same vendor: Canonical
CVE-2026-34177Same vendor: Canonical
CVE-2025-15480Same vendor: Canonical
CVE-2025-25783Shared CWE-434
CVE-2025-27683Shared CWE-434

References