{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T09:59:20.471","vulnerabilities":[{"cve":{"id":"CVE-2024-3250","sourceIdentifier":"security@ubuntu.com","published":"2024-04-04T15:15:39.837","lastModified":"2025-08-26T17:17:50.287","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4."},{"lang":"es","value":"Se descubrió que la API de lectura de archivos del administrador de servicios Pebble de Canonical y el comando pebble pull asociado, antes de v1.10.2, permitían a los usuarios locales sin privilegios leer archivos con permisos equivalentes a root cuando Pebble se ejecutaba como root. Las correcciones también están disponibles como backports para v1.1.1, v1.4.2 y v1.7.4."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.0,"impactScore":4.0}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:pebble:*:*:*:*:*:go:*:*","versionEndExcluding":"1.4.1","matchCriteriaId":"FB0290DF-1704-4ABE-81FC-0D251CEB8A6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:pebble:*:*:*:*:*:go:*:*","versionStartIncluding":"1.4.2","versionEndExcluding":"1.7.3","matchCriteriaId":"A51F25E7-35D5-48EB-A11E-3AD1D6A90842"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:pebble:*:*:*:*:*:go:*:*","versionStartIncluding":"1.7.4","versionEndExcluding":"1.10.2","matchCriteriaId":"FAB6EEDB-DD43-4779-87EF-8E724812F0B9"}]}]}],"references":[{"url":"https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj","source":"security@ubuntu.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-3250","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-3250","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}