CVE-2026-6369
MEDIUMExposed Session Token in canonical-livepatch client snap
Title source: cnaDescription
An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server.
Scores
CVSS v4
5.7
EPSS
0.0002
EPSS Percentile
4.5%
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:L/SA:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-306
CWE-732
Status
published
Products (1)
Canonical/canonical-livepatch
< 10.15.0
Published
Apr 20, 2026
Tracked Since
Apr 20, 2026