juju-secret-set-bug-overwrites-kubernetes-secrets

Juju “secret-set” bug lets grantees overwrite Kubernetes secrets, a serious information security and data breach risk

What happened

Right up front, the weird detail: when the Juju “secret-set” tool logs an error during an exploitation attempt, the secret is still updated, and the new value is visible to both the owner and the grantee.

The issue affects Juju releases from 3.0.0 through 3.6.18 and was reported 16 minutes ago as CVE-2026-32693, severity 8.8 (HIGH). The flaw means a grantee can update secret content and, because of incorrect authorisation checks, could read or update other secrets too.

Who is affected has not been exhaustively listed by the advisory, beyond Juju instances using the affected versions. How the issue was discovered has not been disclosed in the data provided. What is confirmed is the behaviour: the “secret-set” tool does not perform authorisation correctly, and secret values can be changed and observed by parties who should not have that level of access.

Why this matters to businesses

Secrets in Kubernetes are often the keys to production services, CI pipelines and cloud APIs, so exposure or unauthorised changes can turn quiet admin work into a live incident fast.

Following this Juju bug, impacted organisations face possible service disruption, unauthorised access to downstream systems, regulatory scrutiny, and costly incident response. Boards will soon want answers, insurers may ask for timelines, and customers will want reassurance that credentials were not misused.

And yes, patch later thinking is exactly the habit that makes these nights longer for everyone.

If you’ve got the same weakness, here’s what happens next

If you run an affected Juju version and you’ve granted secret-set access to third parties, contractors or automation accounts, those grants can be abused to change secrets quietly, which then looks legitimate to the system owner.

Since changed secrets may be visible to both owner and grantee, an attacker could swap values to create a backdoor or to extract valid credentials later, while the organisation chases the wrong audit trail. Recovery then becomes a mix of key rotation, forensic log sifting and trust rebuilding, not a quick revert.

That kind of quiet persistence is expensive. Leadership time is eaten by crisis calls, suppliers are put on hold, and trust slips away from partners and customers.

What to do on Monday morning

  • Inventory Juju installs and versions across your estate, prioritising any running 3.0.0 through 3.6.18 instances.

  • Check who has been granted use of the “secret-set” tool, and revoke any non-essential grants immediately, especially for automation accounts and third-party operators.

  • Rotate secrets that could have been changed or read by untrusted parties, and plan a wider rotation cadence for all high-value secrets.

  • Enable or review audit logging for secret management operations, and search logs for unexpected “secret-set” activity and for entries around the time the vulnerability was reported.

  • Contact the Juju project or your support channel for vendor guidance, and apply any vendor patches or mitigations as soon as they are available; if no patch exists, increase compensating controls until one does.

  • Run access reviews to enforce least privilege on secret management, and remove shared or overly broad accounts used to set secrets.

  • Test your incident response playbook for secret compromise scenarios, including secret rotation, credential revocation, and communication to regulators and customers.

Where ISO standards fit, without the sales pitch

An ISO-aligned approach helps stop this kind of issue turning into a long crisis. A clear asset and access control policy, tied to an ISO 27001 style system, limits who can touch secrets and forces formal authorisation checks, which would reduce the likelihood and blast radius of the Juju flaw. See a practical primer on how to build that control set at ISO 27001 guidance.

When recovery and continuity are on the table, formal business continuity practises reduce downtime and speed decision making, so link your secret-rotation and incident playbooks to a tested BCMS, for example using the principles explained at ISO 22301.

For baseline certification and straightforward controls that lift overall maturity and auditability, look at an IASME aligned programme, which helps get basic risk, supplier and access controls right without overengineering, more information at IASME certifications.

Put simply, an ISO-style management system makes it more likely you spot a bad secret change quickly, remove risky grants quickly, and prove to regulators you acted promptly.

Quick wrap up, no waffle: Juju versions 3.0.0 through 3.6.18 are affected, the bug lives in the “secret-set” authorisation logic, and the real work for most organisations is inventory, revoke, rotate, patch and test. Do those things, and your Monday will be better than it might be otherwise.

Share This Post:

Facebook
Twitter
LinkedIn
Pinterest
Email
WhatsApp
Picture of Adam Cooke
Adam Cooke
As the Operations and Compliance Manager, Adam oversees all aspects of the business, ensuring operational efficiency and regulatory compliance. Committed to high standards, he ensures everyone is heard and supported. With a strong background in the railway industry, Adam values rigorous standards and safety. Outside of work, he enjoys dog walking, gardening, and exploring new places and cuisines.
What our clients say:
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue