CVE-2024-8185Failing Open in Vault Enterprise

CWE-636Failing Open5 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.8%
top 25.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 31
Latest updateNov 1

Description

Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

CVEListV5hashicorp/vault_enterprise1.2.01.18.1
NVDhashicorp/vault1.2.01.16.12+3
Gogithub.com/hashicorp_vault1.2.01.18.1
NVDopenbao/openbao< 2.0.3

🔴Vulnerability Details

3
OSV
Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault2024-11-01
OSV
Hashicorp Vault vulnerable to denial of service through memory exhaustion2024-10-31
GHSA
Hashicorp Vault vulnerable to denial of service through memory exhaustion2024-10-31

📋Vendor Advisories

1
Red Hat
hashicorp/vault: Vault Vulnerable to Denial of Service When Processing Raft Join Requests2024-10-31