Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2820 | Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15. |
Github GHSA |
GHSA-jg74-mwgw-v6x3 | Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 13 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openbao
Openbao openbao |
|
| CPEs | cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openbao
Openbao openbao |
Fri, 08 Aug 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashicorp vault
|
|
| CPEs | cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:* cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:* |
|
| Vendors & Products |
Hashicorp vault
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 10 Jan 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 27 Sep 2024 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 26 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashicorp
Hashicorp vault Community Edition Hashicorp vault Enterprise |
|
| CPEs | cpe:2.3:a:hashicorp:vault_community_edition:*:*:*:*:*:*:*:* cpe:2.3:a:hashicorp:vault_enterprise:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Hashicorp
Hashicorp vault Community Edition Hashicorp vault Enterprise |
|
| Metrics |
ssvc
|
Thu, 26 Sep 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vault’s SSH secrets engine did not require the {{valid_principals}} list to contain a value by default. If the {{valid_principals}} and {{default_user}} fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15. | Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15. |
Thu, 26 Sep 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vault’s SSH secrets engine did not require the {{valid_principals}} list to contain a value by default. If the {{valid_principals}} and {{default_user}} fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15. | |
| Title | Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2025-01-10T13:06:49.543Z
Reserved: 2024-08-07T17:46:31.343Z
Link: CVE-2024-7594
Updated: 2025-01-10T13:06:49.543Z
Status : Analyzed
Published: 2024-09-26T20:15:07.687
Modified: 2025-11-13T17:51:32.390
Link: CVE-2024-7594
OpenCVE Enrichment
No data.
EUVD
Github GHSA