CVE-2020-28053Incorrect Authorization in Hashicorp Consul

Severity
6.5MEDIUMNVD
EPSS
0.3%
top 50.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 23
Latest updateJan 13

Description

HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDhashicorp/consul1.2.01.6.10+2
Gogithub.com/hashicorp_consul1.2.01.6.10+2
Debianhashicorp/consul< 1.8.6+dfsg1-1
debiandebian/consul< consul 1.8.6+dfsg1-1 (bullseye)

🔴Vulnerability Details

4
OSV
Privilege Escalation in HashiCorp Consul in github.com/hashicorp/consul2024-06-28
GHSA
Privilege Escalation in HashiCorp Consul2024-01-31
OSV
Privilege Escalation in HashiCorp Consul2024-01-31
OSV
CVE-2020-28053: HashiCorp Consul and Consul Enterprise 12020-11-23

📋Vendor Advisories

1
Debian
CVE-2020-28053: consul - HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with ...2020

📄Research Papers

1
arXiv
Now Let's Make It Physical: Enabling Physically Trusted Certificate Issuance for Keyless Security in CAs2025-01-13