CVE-2026-6369
Exposed Session Token in canonical-livepatch client snap
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server.
| CWE | CWE-306 CWE-732 |
| Vendor | canonical |
| Product | canonical-livepatch |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 20, 2026 |
| Last Updated | Apr 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for canonical canonical-livepatch
Be the first to know when new unknown vulnerabilities affecting canonical canonical-livepatch are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Canonical / canonical-livepatch
0 < 10.15.0