Impact
Vault’s PKI engine allowed ACME http-01 and tls-alpn-01 challenges to be validated against local or attacker‑controlled DNS targets. This flaw permits the server to issue HTTP requests to internal services, exposing sensitive data that should remain unavailable to external clients.
Affected Systems
The vulnerability affects HashiCorp Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0 as well as earlier Enterprise releases 1.21.5, 1.20.10, and 1.19.16. Any deployment of these versions that performs ACME challenge validation is potentially exposed.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate impact. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting an unknown exploitation probability. The likely attack vector involves manipulating DNS for a domain used in ACME challenge validation, enabling an attacker to direct Vault’s internal request to a local resource. The potential impact is data leakage from internal services vulnerable to SSRF.
OpenCVE Enrichment