Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.
This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Nov 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 31 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Hashicorp
Hashicorp vault |
|
CPEs | cpe:2.3:a:hashicorp:vault:*:*:*:*:community:*:*:* cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:* |
|
Vendors & Products |
Hashicorp
Hashicorp vault |
|
Metrics |
ssvc
|
Thu, 31 Oct 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12. | |
Title | Vault Vulnerable to Denial of Service When Processing Raft Join Requests | |
Weaknesses | CWE-636 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: HashiCorp
Published: 2024-10-31T15:14:55.145Z
Updated: 2024-10-31T17:11:35.647Z
Reserved: 2024-08-26T16:24:04.547Z
Link: CVE-2024-8185
Vulnrichment
Updated: 2024-10-31T16:58:16.160Z
NVD
Status : Awaiting Analysis
Published: 2024-10-31T16:15:06.267
Modified: 2024-11-01T12:57:03.417
Link: CVE-2024-8185
Redhat