{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T04:48:16.443","vulnerabilities":[{"cve":{"id":"CVE-2024-8038","sourceIdentifier":"security@ubuntu.com","published":"2024-10-02T11:15:11.853","lastModified":"2025-08-26T17:44:59.090","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerable juju introspection abstract UNIX domain socket. An abstract UNIX domain socket responsible for introspection is available without authentication locally to network namespace users. This enables denial of service attacks."},{"lang":"es","value":"Socket de dominio UNIX abstracto de introspección de juju vulnerable. Un socket de dominio UNIX abstracto responsable de la introspección está disponible sin autenticación localmente para los usuarios del espacio de nombres de la red. Esto permite ataques de denegación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H","baseScore":7.9,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-420"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*","versionEndExcluding":"2.9.51","matchCriteriaId":"956F1957-34C5-47D9-B922-107963295A1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndExcluding":"3.1.10","matchCriteriaId":"32122910-827A-438E-B1DD-42C8E24D7F5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.0","versionEndIncluding":"3.2.4","matchCriteriaId":"BA2EB481-D7FF-4A83-B7ED-A6FCE9AE1029"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3","versionEndExcluding":"3.3.7","matchCriteriaId":"E3C17769-1003-49A2-A87C-003A9E7E81CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"3.4.6","matchCriteriaId":"6693CCDC-308E-40B3-BC8A-F9A2320A06F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.0","versionEndExcluding":"3.5.4","matchCriteriaId":"62BC59FA-04DB-4AC3-977D-691ED721171F"}]}]}],"references":[{"url":"https://github.com/juju/juju/security/advisories/GHSA-xwgj-vpm9-q2rq","source":"security@ubuntu.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-8038","source":"security@ubuntu.com","tags":["Third Party Advisory"]}]}}]}