Description
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Published: 2024-02-05
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0734 Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Github GHSA Github GHSA GHSA-vh73-q3rw-qx7w Boundary vulnerable to session hijacking through TLS certificate tampering
History

No history.

Subscriptions

Hashicorp Boundary
cve-icon MITRE

Status: PUBLISHED

Assigner: HashiCorp

Published:

Updated: 2024-08-01T18:26:30.420Z

Reserved: 2024-01-29T20:35:33.313Z

Link: CVE-2024-1052

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.420Z

cve-icon NVD

Status : Modified

Published: 2024-02-05T21:15:11.640

Modified: 2024-11-21T08:49:41.313

Link: CVE-2024-1052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses