CVE-2021-37219Improper Certificate Validation in Hashicorp Consul

Severity
8.8HIGHNVD
EPSS
0.4%
top 37.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 7
Latest updateAug 21

Description

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

NVDhashicorp/consul1.9.01.9.9+2
Gogithub.com/hashicorp_consul1.9.01.9.9+2
debiandebian/consul

🔴Vulnerability Details

4
OSV
HashiCorp Consul Privilege Escalation Vulnerability in github.com/hashicorp/consul2024-08-21
OSV
HashiCorp Consul Privilege Escalation Vulnerability2021-09-08
GHSA
HashiCorp Consul Privilege Escalation Vulnerability2021-09-08
OSV
CVE-2021-37219: HashiCorp Consul and Consul Enterprise 12021-09-07

📋Vendor Advisories

2
Red Hat
consul: RPC layer allows non-server agents to access server-only functionality2021-08-26
Debian
CVE-2021-37219: consul - HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server a...2021