CVE-2026-3351

Severity
2.1LOW
EPSS
0.0%
top 93.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3
Latest updateMar 10

Description

Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Affected Packages3 packages

Gogithub.com/canonical/lxd< 0.0.0-20260224152359-d936c90d47cf
CVEListV5canonical/lxd6.6
NVDcanonical/lxd6.6

Patches

🔴Vulnerability Details

5
OSV
Non-recursive certificate listing bypasses per-object authorization and leaks all fingerprints in github.com/canonical/lxd2026-03-10
OSV
lxd's non-recursive certificate listing bypasses per-object authorization and leaks all fingerprints2026-03-04
GHSA
lxd's non-recursive certificate listing bypasses per-object authorization and leaks all fingerprints2026-03-04
OSV
CVE-2026-3351: Improper authorization in the API endpoint GET /12026-03-03
CVEList
Authorization Bypass in LXD GET /1.0/certificates Endpoint2026-03-03

📋Vendor Advisories

1
Debian
CVE-2026-3351: incus - Improper authorization in the API endpoint GET /1.0/certificates in Canonical LX...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-3351 Impact, Exploitability, and Mitigation Steps | Wiz