{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-32691","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2026-03-13T12:53:34.544Z","datePublished":"2026-03-18T12:28:11.546Z","dateUpdated":"2026-03-18T13:49:09.338Z"},"containers":{"cna":{"title":"Timing ownership claim attack on new external back-end secrets","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-708","description":"CWE-708 Incorrect ownership assignment","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-29","descriptions":[{"lang":"en","value":"CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions"}]}],"affected":[{"vendor":"Canonical","product":"Juju","platforms":["Linux"],"collectionURL":"https://github.com/juju/","packageName":"juju","repo":"https://github.com/juju/juju","versions":[{"status":"affected","version":"3.0.0","lessThan":"3.6.19","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision."}],"references":[{"url":"https://github.com/juju/juju/security/advisories/GHSA-gfgr-6hrj-85ww","tags":["vendor-advisory","vdb-entry"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}}],"credits":[{"lang":"en","value":"Harry Pidcock","type":"finder"}],"source":{"discovery":"INTERNAL"},"providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2026-03-18T12:28:11.546Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-18T13:46:45.894829Z","id":"CVE-2026-32691","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-18T13:49:09.338Z"}}]}}