🔐 CVE Alert

CVE-2026-6369

UNKNOWN 0.0

Exposed Session Token in canonical-livepatch client snap

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server.

CWE CWE-306 CWE-732
Vendor canonical
Product canonical-livepatch
Ecosystems
Industries
Technology
Published Apr 20, 2026
Last Updated Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for canonical canonical-livepatch

Be the first to know when new unknown vulnerabilities affecting canonical canonical-livepatch are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Canonical / canonical-livepatch
0 < 10.15.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
discourse.ubuntu.com: https://discourse.ubuntu.com/t/security-notice-canonical-livepatch-client-snap-vulnerability/80662