CRITICALCVE-2024-6107CVSS 9.6

Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the correspo

翻译中…

平台

linux

组件

maas

修复版本

3.1.4

3.2.11

3.3.8

3.4.4

3.5.1

AI Confidence: highNVDEPSS 0.1%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2024-6107 is a critical vulnerability affecting MAAS versions 3.1.0 through 3.5.1. This flaw stems from insufficient verification, enabling a malicious client to bypass authentication checks and execute Remote Procedure Call (RPC) commands within a region. Successful exploitation grants an attacker unauthorized control, potentially leading to significant system compromise. A fix is available in version 3.5.1.

影响与攻击场景翻译中…

The impact of CVE-2024-6107 is severe. An attacker who successfully exploits this vulnerability can gain complete control over a region within the MAAS environment. This includes the ability to provision, modify, and delete virtual machines and bare metal servers, effectively compromising the entire infrastructure managed by MAAS. The attacker could also potentially leverage this access to move laterally within the network, depending on the configuration and access controls in place. The blast radius extends to all systems managed by the affected MAAS region.

利用背景翻译中…

CVE-2024-6107 has been published on 2025-07-21. The EPSS score is likely to be high given the critical CVSS score and the potential for remote, unauthenticated exploitation. Public proof-of-concept code is not currently available, but the vulnerability's nature suggests it could be relatively easy to exploit. Monitor CISA and vendor advisories for further updates and potential exploitation campaigns.

哪些人处于风险中翻译中…

Organizations heavily reliant on MAAS for automated server provisioning and management are at significant risk. Specifically, those using older versions (3.1.0–3.5.1) and those with less stringent network security controls are particularly vulnerable. Shared hosting environments utilizing MAAS for resource allocation also face increased exposure.

检测步骤翻译中…

• linux / server:

journalctl -u maas -g "authentication failure"

• linux / server:

ps aux | grep -i rpc

• linux / server:

ss -lptn 'dst :80' # Check for unusual connections to RPC ports

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.10% (28% 百分位)

CISA SSVC

利用情况poc
可自动化no
技术影响partial

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H9.6CRITICALAttack VectorAdjacent攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeChanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityLow数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
相邻 — 需要网络邻近:相同LAN、蓝牙或本地无线网段。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
已改变 — 攻击可以超出脆弱组件,影响其他系统。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
低 — 攻击者可修改部分数据,影响有限。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件maas
供应商Canonical
影响范围修复版本
3.1.0 – 3.1.43.1.4
3.2.0 – 3.2.113.2.11
3.3.0 – 3.3.83.3.8
3.4.0 – 3.4.43.4.4
3.5.0 – 3.5.13.5.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2024-6107 is to upgrade to MAAS version 3.5.1 or later. If immediate upgrade is not feasible, consider implementing stricter network segmentation to limit the potential impact of a successful attack. Review and harden RPC access controls within the MAAS environment. Monitor MAAS logs for suspicious activity, particularly related to RPC calls and authentication attempts. While a direct WAF rule is unlikely, consider rules that restrict access to RPC endpoints from untrusted sources. After upgrading, confirm the fix by attempting to authenticate with a malicious client and verifying that authentication is rejected.

修复方法翻译中…

Actualice MAAS a la versión corregida que incluye la solución para la verificación insuficiente. Esto evitará que atacantes remotos ejecuten comandos RPC no autorizados. Consulte las notas de la versión de MAAS para obtener detalles específicos sobre la actualización.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2024-6107 — RPC Bypass in MAAS 3.1.0–3.5.1?

CVE-2024-6107 is a critical vulnerability in MAAS versions 3.1.0 through 3.5.1 that allows attackers to bypass authentication and execute RPC commands, potentially gaining control of managed regions.

Am I affected by CVE-2024-6107 in MAAS 3.1.0–3.5.1?

If you are running MAAS versions 3.1.0, 3.2.0, 3.3.0, 3.4.0, or 3.5.0, you are vulnerable to this RPC bypass vulnerability. Check your version immediately.

How do I fix CVE-2024-6107 in MAAS 3.1.0–3.5.1?

Upgrade to MAAS version 3.5.1 or later to address this vulnerability. If immediate upgrade is not possible, implement network segmentation and monitor logs.

Is CVE-2024-6107 being actively exploited?

While no active exploitation has been publicly confirmed, the critical severity and ease of potential exploitation suggest it is a high-priority risk. Monitor for updates.

Where can I find the official MAAS advisory for CVE-2024-6107?

Refer to the official MAAS security advisories on the Canonical website for detailed information and updates regarding CVE-2024-6107.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。