Vulnerabilities (CVE)

Filtered by vendor Hashicorp Subscribe
Total 150 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-35453 1 Hashicorp 1 Vault 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
HashiCorp Vault Enterprise’s Sentinel EGP policy feature incorrectly allowed requests to be processed in parent and sibling namespaces. Fixed in 1.5.6 and 1.6.1.
CVE-2020-25201 1 Hashicorp 1 Consul 2024-02-28 5.0 MEDIUM 7.5 HIGH
HashiCorp Consul Enterprise version 1.7.0 up to 1.8.4 includes a namespace replication bug which can be triggered to cause denial of service via infinite Raft writes. Fixed in 1.7.9 and 1.8.5.
CVE-2020-29564 1 Hashicorp 1 Consul Docker Image 2024-02-28 10.0 HIGH 9.8 CRITICAL
The official Consul Docker images 0.7.1 through 1.4.2 contain a blank password for a root user. System using the Consul Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-27195 1 Hashicorp 1 Nomad 2024-02-28 6.4 MEDIUM 9.1 CRITICAL
HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6
CVE-2020-35192 1 Hashicorp 1 Vault 2024-02-28 10.0 HIGH 9.8 CRITICAL
The official vault docker images before 0.11.6 contain a blank password for a root user. System using the vault docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-8567 3 Google, Hashicorp, Microsoft 3 Secret Manager Provider For Secret Store Csi Driver, Vault Provider For Secrets Store Csi Driver, Azure Key Vault Provider For Secrets Store Csi Driver 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-25816 1 Hashicorp 1 Vault 2024-02-28 4.9 MEDIUM 6.8 MEDIUM
HashiCorp Vault and Vault Enterprise versions 1.0 and newer allowed leases created with a batch token to outlive their TTL because expiration time was not scheduled correctly. Fixed in 1.4.7 and 1.5.4.
CVE-2021-3121 2 Golang, Hashicorp 2 Protobuf, Consul 2024-02-28 7.5 HIGH 8.6 HIGH
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.
CVE-2021-3282 1 Hashicorp 1 Vault 2024-02-28 5.0 MEDIUM 7.5 HIGH
HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.
CVE-2021-3283 1 Hashicorp 1 Nomad 2024-02-28 5.0 MEDIUM 7.5 HIGH
HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3.
CVE-2020-25594 1 Hashicorp 1 Vault 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
HashiCorp Vault and Vault Enterprise allowed for enumeration of Secrets Engine mount paths via unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
CVE-2020-29529 1 Hashicorp 1 Go-slug 2024-02-28 5.0 MEDIUM 7.5 HIGH
HashiCorp go-slug up to 0.4.3 did not fully protect against directory traversal while unpacking tar archives, and protections could be bypassed with specific constructions of multiple symlinks. Fixed in 0.5.0.
CVE-2021-3024 1 Hashicorp 1 Vault 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
CVE-2020-12758 1 Hashicorp 1 Consul 2024-02-28 5.0 MEDIUM 7.5 HIGH
HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
CVE-2020-12797 1 Hashicorp 1 Consul 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
CVE-2020-10944 1 Hashicorp 1 Nomad 2024-02-28 3.5 LOW 5.4 MEDIUM
HashiCorp Nomad and Nomad Enterprise up to 0.10.4 contained a cross-site scripting vulnerability such that files from a malicious workload could cause arbitrary JavaScript to execute in the web UI. Fixed in 0.10.5.
CVE-2020-15511 1 Hashicorp 1 Terraform Enterprise 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
HashiCorp Terraform Enterprise up to v202006-1 contained a default signup page that allowed user registration even when disabled, bypassing SAML enforcement. Fixed in v202007-1.
CVE-2020-13170 1 Hashicorp 1 Consul 2024-02-28 5.0 MEDIUM 7.5 HIGH
HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
CVE-2020-13250 1 Hashicorp 1 Consul 2024-02-28 5.0 MEDIUM 7.5 HIGH
HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4.
CVE-2020-16250 1 Hashicorp 1 Vault 2024-02-28 7.5 HIGH 8.2 HIGH
HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..