hashicorp CVE Vulnerabilities & Metrics

Focus on hashicorp vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About hashicorp Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with hashicorp. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total hashicorp CVEs: 149
Earliest CVE date: 02 Aug 2017, 19:29 UTC
Latest CVE date: 30 Oct 2024, 22:15 UTC

Latest CVE reference: CVE-2024-10086

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 6

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -79.31%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -79.31%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical hashicorp CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.61

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 60
4.0-6.9 67
7.0-8.9 19
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS hashicorp CVEs

These are the five CVEs with the highest CVSS scores for hashicorp, sorted by severity first and recency.

All CVEs for hashicorp

CVE-2024-10086 hashicorp vulnerability CVSS: 0 30 Oct 2024, 22:15 UTC

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

CVE-2024-10006 hashicorp vulnerability CVSS: 0 30 Oct 2024, 22:15 UTC

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.

CVE-2024-10005 hashicorp vulnerability CVSS: 0 30 Oct 2024, 22:15 UTC

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.

CVE-2024-9180 hashicorp vulnerability CVSS: 0 10 Oct 2024, 21:15 UTC

A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s privileges to Vault’s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16.

CVE-2024-8365 hashicorp vulnerability CVSS: 0 02 Sep 2024, 05:15 UTC

Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values of client tokens and token accessors being stored in the audit log. This vulnerability, CVE-2024-8365, was fixed in Vault Community Edition and Vault Enterprise 1.17.5 and Vault Enterprise 1.16.9.

CVE-2024-6104 hashicorp vulnerability CVSS: 0 24 Jun 2024, 17:15 UTC

go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.

CVE-2024-1329 hashicorp vulnerability CVSS: 0 08 Feb 2024, 20:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. This vulnerability, CVE-2024-1329, is fixed in Nomad 1.7.4, 1.6.7, and 1.5.14.

CVE-2024-1052 hashicorp vulnerability CVSS: 0 05 Feb 2024, 21:15 UTC

Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.

CVE-2024-0831 hashicorp vulnerability CVSS: 0 01 Feb 2024, 02:15 UTC

Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw`.

CVE-2023-6337 hashicorp vulnerability CVSS: 0 08 Dec 2023, 22:15 UTC

HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request to memory, resulting in the exhaustion of available memory on the host, which may cause Vault to crash. Fixed in Vault 1.15.4, 1.14.8, 1.13.12.

CVE-2023-5332 hashicorp vulnerability CVSS: 0 04 Dec 2023, 07:15 UTC

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

CVE-2023-5954 hashicorp vulnerability CVSS: 0 09 Nov 2023, 21:15 UTC

HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.

CVE-2023-5834 hashicorp vulnerability CVSS: 0 27 Oct 2023, 22:15 UTC

HashiCorp Vagrant's Windows installer targeted a custom location with a non-protected path that could be junctioned, introducing potential for unauthorized file system writes. Fixed in Vagrant 2.4.0.

CVE-2023-5077 hashicorp vulnerability CVSS: 0 29 Sep 2023, 00:15 UTC

The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0.

CVE-2023-3775 hashicorp vulnerability CVSS: 0 29 Sep 2023, 00:15 UTC

A Vault Enterprise Sentinel Role Governing Policy created by an operator to restrict access to resources in one namespace can be applied to requests outside in another non-descendant namespace, potentially resulting in denial of service. Fixed in Vault Enterprise 1.15.0, 1.14.4, 1.13.8.

CVE-2023-4680 hashicorp vulnerability CVSS: 0 15 Sep 2023, 00:15 UTC

HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.

CVE-2023-4782 hashicorp vulnerability CVSS: 0 08 Sep 2023, 18:15 UTC

Terraform version 1.0.8 through 1.5.6 allows arbitrary file write during the `init` operation if run on maliciously crafted Terraform configuration. This vulnerability is fixed in Terraform 1.5.7.

CVE-2023-3518 hashicorp vulnerability CVSS: 0 09 Aug 2023, 16:15 UTC

HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.

CVE-2023-3462 hashicorp vulnerability CVSS: 0 31 Jul 2023, 23:15 UTC

HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.

CVE-2023-3774 hashicorp vulnerability CVSS: 0 28 Jul 2023, 01:15 UTC

An unhandled error in Vault Enterprise's namespace creation may cause the Vault process to crash, potentially resulting in denial of service. Fixed in 1.14.1, 1.13.5, and 1.12.9.

CVE-2023-3300 hashicorp vulnerability CVSS: 0 20 Jul 2023, 00:15 UTC

HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 1.4.1 HTTP search API can reveal names of available CSI plugins to unauthenticated users or users without the plugin:read policy. Fixed in 1.6.0, 1.5.7, and 1.4.1.

CVE-2023-3299 hashicorp vulnerability CVSS: 0 20 Jul 2023, 00:15 UTC

HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.

CVE-2023-3072 hashicorp vulnerability CVSS: 0 20 Jul 2023, 00:15 UTC

HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.

CVE-2023-3114 hashicorp vulnerability CVSS: 0 22 Jun 2023, 22:15 UTC

Terraform Enterprise since v202207-1 did not properly implement authorization rules for agent pools, allowing the workspace to be targeted by unauthorized agents. This authorization flaw could potentially allow a workspace to access resources from a separate, higher-privileged workspace in the same organization that targeted an agent pool. This vulnerability, CVE-2023-3114, is fixed in Terraform Enterprise v202306-1.

CVE-2023-2121 hashicorp vulnerability CVSS: 0 09 Jun 2023, 17:15 UTC

Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11.

CVE-2023-2816 hashicorp vulnerability CVSS: 0 02 Jun 2023, 23:15 UTC

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.

CVE-2023-1297 hashicorp vulnerability CVSS: 0 02 Jun 2023, 23:15 UTC

Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3

CVE-2023-2197 hashicorp vulnerability CVSS: 0 01 May 2023, 20:15 UTC

HashiCorp Vault Enterprise 1.13.0 up to 1.13.1 is vulnerable to a padding oracle attack when using an HSM in conjunction with the CKM_AES_CBC_PAD or CKM_AES_CBC encryption mechanisms. An attacker with privileges to modify storage and restart Vault may be able to intercept or modify cipher text in order to derive Vault’s root key. Fixed in 1.13.2

CVE-2023-1782 hashicorp vulnerability CVSS: 0 05 Apr 2023, 20:15 UTC

HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.

CVE-2023-25000 hashicorp vulnerability CVSS: 0 30 Mar 2023, 01:15 UTC

HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.

CVE-2023-0665 hashicorp vulnerability CVSS: 0 30 Mar 2023, 01:15 UTC

HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.

CVE-2023-0620 hashicorp vulnerability CVSS: 0 30 Mar 2023, 01:15 UTC

HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.

CVE-2023-1299 hashicorp vulnerability CVSS: 0 14 Mar 2023, 15:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.5.0 allow a job submitter to escalate to management-level privileges using workload identity and task API. Fixed in 1.5.1.

CVE-2023-1296 hashicorp vulnerability CVSS: 0 14 Mar 2023, 15:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.5.0 did not correctly enforce deny policies applied to a workload’s variables. Fixed in 1.4.6 and 1.5.1.

CVE-2023-24999 hashicorp vulnerability CVSS: 0 11 Mar 2023, 00:15 UTC

HashiCorp Vault and Vault Enterprise’s approle auth method allowed any authenticated user with access to an approle destroy endpoint to destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability is fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above.

CVE-2023-0845 hashicorp vulnerability CVSS: 0 09 Mar 2023, 16:15 UTC

Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.

CVE-2023-0821 hashicorp vulnerability CVSS: 0 16 Feb 2023, 22:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 jobs using a maliciously compressed artifact stanza source can cause excessive disk usage. Fixed in 1.2.16, 1.3.9, and 1.4.4.

CVE-2023-0475 hashicorp vulnerability CVSS: 0 16 Feb 2023, 19:15 UTC

HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0.

CVE-2023-0690 hashicorp vulnerability CVSS: 0 08 Feb 2023, 19:15 UTC

HashiCorp Boundary from 0.10.0 through 0.11.2 contain an issue where when using a PKI-based worker with a Key Management Service (KMS) defined in the configuration file, new credentials created after an automatic rotation may not have been encrypted via the intended KMS. This would result in the credentials being stored in plaintext on the Boundary PKI worker’s disk. This issue is fixed in version 0.12.0.

CVE-2019-14802 hashicorp vulnerability CVSS: 0 26 Dec 2022, 21:15 UTC

HashiCorp Nomad 0.5.0 through 0.9.4 (fixed in 0.9.5) reveals unintended environment variables to the rendering task during template rendering, aka GHSA-6hv3-7c34-4hx8. This applies to nomad/client/allocrunner/taskrunner/template.

CVE-2022-3920 hashicorp vulnerability CVSS: 0 16 Nov 2022, 00:15 UTC

HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0.

CVE-2022-3867 hashicorp vulnerability CVSS: 0 10 Nov 2022, 06:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2.

CVE-2022-3866 hashicorp vulnerability CVSS: 0 10 Nov 2022, 06:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under nomad/ that belong to other jobs in the same namespace. Fixed in 1.4.2.

CVE-2022-36182 hashicorp vulnerability CVSS: 0 27 Oct 2022, 13:15 UTC

Hashicorp Boundary v0.8.0 is vulnerable to Clickjacking which allow for the interception of login credentials, re-direction of users to malicious sites, or causing users to perform malicious actions on the site.

CVE-2022-41316 hashicorp vulnerability CVSS: 0 12 Oct 2022, 21:15 UTC

HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the role's CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been retrieved. Fixed in 1.12.0, 1.11.4, 1.10.7, and 1.9.10.

CVE-2022-41606 hashicorp vulnerability CVSS: 0 12 Oct 2022, 00:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.0.2 up to 1.2.12, and 1.3.5 jobs submitted with an artifact stanza using invalid S3 or GCS URLs can be used to crash client agents. Fixed in 1.2.13, 1.3.6, and 1.4.0.

CVE-2022-42717 hashicorp vulnerability CVSS: 0 11 Oct 2022, 23:15 UTC

An issue was discovered in Hashicorp Packer before 2.3.1. The recommended sudoers configuration for Vagrant on Linux is insecure. If the host has been configured according to this documentation, non-privileged users on the host can leverage a wildcard in the sudoers configuration to execute arbitrary commands as root.

CVE-2022-40716 hashicorp vulnerability CVSS: 0 23 Sep 2022, 12:15 UTC

HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."

CVE-2021-41803 hashicorp vulnerability CVSS: 0 23 Sep 2022, 01:15 UTC

HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2."

CVE-2022-40186 hashicorp vulnerability CVSS: 0 22 Sep 2022, 01:15 UTC

An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.

CVE-2022-36130 hashicorp vulnerability CVSS: 0 01 Sep 2022, 02:15 UTC

HashiCorp Boundary up to 0.10.1 did not properly perform data integrity checks to ensure the resources were associated with the correct scopes, allowing potential privilege escalation for authorized users of another scope. Fixed in Boundary 0.10.2.

CVE-2022-38149 hashicorp vulnerability CVSS: 0 17 Aug 2022, 15:15 UTC

HashiCorp Consul Template up to 0.27.2, 0.28.2, and 0.29.1 may expose the contents of Vault secrets in the error returned by the *template.Template.Execute method, when given a template using Vault secret contents incorrectly. Fixed in 0.27.3, 0.28.3, and 0.29.2.

CVE-2022-36129 hashicorp vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

HashiCorp Vault Enterprise 1.7.0 through 1.9.7, 1.10.4, and 1.11.0 clusters using Integrated Storage expose an unauthenticated API endpoint that could be abused to override the voter status of a node within a Vault HA cluster, introducing potential for future data loss or catastrophic failure. Fixed in Vault Enterprise 1.9.8, 1.10.5, and 1.11.1.

CVE-2022-30324 hashicorp vulnerability CVSS: 7.5 02 Jun 2022, 14:15 UTC

HashiCorp Nomad and Nomad Enterprise version 0.2.0 up to 1.3.0 were impacted by go-getter vulnerabilities enabling privilege escalation through the artifact stanza in submitted jobs onto the client agent host. Fixed in 1.1.14, 1.2.8, and 1.3.1.

CVE-2022-30323 hashicorp vulnerability CVSS: 7.5 25 May 2022, 12:15 UTC

go-getter up to 1.5.11 and 2.0.2 panicked when processing password-protected ZIP files. Fixed in 1.6.1 and 2.1.0.

CVE-2022-30322 hashicorp vulnerability CVSS: 7.5 25 May 2022, 12:15 UTC

go-getter up to 1.5.11 and 2.0.2 allowed asymmetric resource exhaustion when go-getter processed malicious HTTP responses. Fixed in 1.6.1 and 2.1.0.

CVE-2022-30321 hashicorp vulnerability CVSS: 7.5 25 May 2022, 12:15 UTC

go-getter up to 1.5.11 and 2.0.2 allowed arbitrary host access via go-getter path traversal, symlink processing, and command injection flaws. Fixed in 1.6.1 and 2.1.0.

CVE-2022-26945 hashicorp vulnerability CVSS: 7.5 25 May 2022, 12:15 UTC

go-getter up to 1.5.11 and 2.0.2 allowed protocol switching, endless redirect, and configuration bypass via abuse of custom HTTP response header processing. Fixed in 1.6.1 and 2.1.0.

CVE-2022-30689 hashicorp vulnerability CVSS: 5.0 17 May 2022, 18:15 UTC

HashiCorp Vault and Vault Enterprise from 1.10.0 to 1.10.2 did not correctly configure and enforce MFA on login after server restarts. This affects the Login MFA feature introduced in Vault and Vault Enterprise 1.10.0 and does not affect the separate Enterprise MFA feature set. Fixed in 1.10.3.

CVE-2022-29810 hashicorp vulnerability CVSS: 2.1 27 Apr 2022, 06:15 UTC

The Hashicorp go-getter library before 1.5.11 does not redact an SSH key from a URL query parameter.

CVE-2022-29153 hashicorp vulnerability CVSS: 5.0 19 Apr 2022, 16:17 UTC

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.

CVE-2021-44139 hashicorp vulnerability CVSS: 5.0 23 Mar 2022, 17:15 UTC

Sentinel 1.8.2 is vulnerable to Server-side request forgery (SSRF).

CVE-2022-25244 hashicorp vulnerability CVSS: 4.0 10 Mar 2022, 17:47 UTC

Vault Enterprise clusters using the tokenization transform feature can expose the tokenization key through the tokenization key configuration endpoint to authorized operators with `read` permissions on this endpoint. Fixed in Vault Enterprise 1.9.4, 1.8.9 and 1.7.10.

CVE-2022-25243 hashicorp vulnerability CVSS: 3.5 10 Mar 2022, 17:47 UTC

"Vault and Vault Enterprise 1.8.0 through 1.8.8, and 1.9.3 allowed the PKI secrets engine under certain configurations to issue wildcard certificates to authorized users for a specified domain, even if the PKI role policy attribute allow_subdomains is set to false. Fixed in Vault Enterprise 1.8.9 and 1.9.4.

CVE-2022-24685 hashicorp vulnerability CVSS: 5.0 28 Feb 2022, 14:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.0.17, 1.1.11, and 1.2.5 allow invalid HCL for the jobs parse endpoint, which may cause excessive CPU usage. Fixed in 1.0.18, 1.1.12, and 1.2.6.

CVE-2022-25374 hashicorp vulnerability CVSS: 5.0 25 Feb 2022, 13:15 UTC

HashiCorp Terraform Enterprise v202112-1, v202112-2, v202201-1, and v202201-2 were configured to log inbound HTTP requests in a manner that may capture sensitive data. Fixed in v202202-1.

CVE-2022-24687 hashicorp vulnerability CVSS: 3.5 24 Feb 2022, 16:15 UTC

HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.10.7, and 1.11.2 clusters with at least one Ingress Gateway allow a user with service:write to register a specifically-defined service that can cause Consul servers to panic. Fixed in 1.9.15, 1.10.8, and 1.11.3.

CVE-2022-24683 hashicorp vulnerability CVSS: 7.8 17 Feb 2022, 17:15 UTC

HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root.

CVE-2022-24684 hashicorp vulnerability CVSS: 4.0 15 Feb 2022, 15:15 UTC

HashiCorp Nomad and Nomad Enterprise 0.9.0 through 1.0.16, 1.1.11, and 1.2.5 allow operators with job-submit capabilities to use the spread stanza to panic server agents. Fixed in 1.0.18, 1.1.12, and 1.2.6.

CVE-2022-24686 hashicorp vulnerability CVSS: 4.3 14 Feb 2022, 14:15 UTC

HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and 1.2.5 artifact download functionality has a race condition such that the Nomad client agent could download the wrong artifact into the wrong destination. Fixed in 1.0.18, 1.1.12, and 1.2.6

CVE-2021-45042 hashicorp vulnerability CVSS: 6.8 17 Dec 2021, 14:15 UTC

In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8.6, and 1.9.x before 1.9.1, clusters using the Integrated Storage backend allowed an authenticated user (with write permissions to a kv secrets engine) to cause a panic and denial of service of the storage backend. The earliest affected version is 1.4.0.

CVE-2021-41805 hashicorp vulnerability CVSS: 6.5 12 Dec 2021, 05:15 UTC

HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace.

CVE-2021-43415 hashicorp vulnerability CVSS: 6.0 03 Dec 2021, 22:15 UTC

HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. Fixed in 1.0.14, 1.1.8, and 1.2.1.

CVE-2021-43998 hashicorp vulnerability CVSS: 5.5 30 Nov 2021, 15:15 UTC

HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.

CVE-2021-42135 hashicorp vulnerability CVSS: 4.9 11 Oct 2021, 03:15 UTC

HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.

CVE-2021-41802 hashicorp vulnerability CVSS: 5.5 08 Oct 2021, 17:15 UTC

HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4.

CVE-2021-41865 hashicorp vulnerability CVSS: 4.0 07 Oct 2021, 14:15 UTC

HashiCorp Nomad and Nomad Enterprise 1.1.1 through 1.1.5 allowed authenticated users with job submission capabilities to cause denial of service by submitting incomplete job specifications with a Consul mesh gateway and host networking mode. Fixed in 1.1.6.

CVE-2021-40862 hashicorp vulnerability CVSS: 6.5 15 Sep 2021, 19:15 UTC

HashiCorp Terraform Enterprise up to v202108-1 contained an API endpoint that erroneously disclosed a sensitive URL to authenticated parties, which could be used for privilege escalation or unauthorized modification of a Terraform configuration. Fixed in v202109-1.

CVE-2021-38698 hashicorp vulnerability CVSS: 4.0 07 Sep 2021, 12:15 UTC

HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.

CVE-2021-37219 hashicorp vulnerability CVSS: 6.5 07 Sep 2021, 12:15 UTC

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

CVE-2021-37218 hashicorp vulnerability CVSS: 6.5 07 Sep 2021, 12:15 UTC

HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.

CVE-2021-27668 hashicorp vulnerability CVSS: 5.0 31 Aug 2021, 18:15 UTC

HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3.

CVE-2021-38554 hashicorp vulnerability CVSS: 3.5 13 Aug 2021, 16:15 UTC

HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases.

CVE-2021-38553 hashicorp vulnerability CVSS: 2.1 13 Aug 2021, 16:15 UTC

HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0.

CVE-2021-36230 hashicorp vulnerability CVSS: 6.5 20 Jul 2021, 21:15 UTC

HashiCorp Terraform Enterprise releases up to v202106-1 did not properly perform authorization checks on a subset of API requests executed using the run token, allowing privilege escalation to organization owner. Fixed in v202107-1.

CVE-2021-36213 hashicorp vulnerability CVSS: 5.0 17 Jul 2021, 18:15 UTC

HashiCorp Consul and Consul Enterprise 1.9.0 through 1.10.0 default deny policy with a single L7 application-aware intention deny action cancels out, causing the intention to incorrectly fail open, allowing L4 traffic. Fixed in 1.9.8 and 1.10.1.

CVE-2021-32574 hashicorp vulnerability CVSS: 5.0 17 Jul 2021, 18:15 UTC

HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy proxy TLS configuration does not validate destination service identity in the encoded subject alternative name. Fixed in 1.8.14, 1.9.8, and 1.10.1.

CVE-2021-32575 hashicorp vulnerability CVSS: 3.3 17 Jun 2021, 19:15 UTC

HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.

CVE-2021-32923 hashicorp vulnerability CVSS: 5.8 03 Jun 2021, 11:15 UTC

HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.

CVE-2021-32074 hashicorp vulnerability CVSS: 5.0 07 May 2021, 05:15 UTC

HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.

CVE-2021-30476 hashicorp vulnerability CVSS: 7.5 22 Apr 2021, 17:15 UTC

HashiCorp Terraform’s Vault Provider (terraform-provider-vault) did not correctly configure GCE-type bound labels for Vault’s GCP auth method. Fixed in 2.19.1.

CVE-2021-29653 hashicorp vulnerability CVSS: 4.3 22 Apr 2021, 17:15 UTC

HashiCorp Vault and Vault Enterprise 1.5.1 and newer, under certain circumstances, may exclude revoked but unexpired certificates from the CRL. Fixed in 1.5.8, 1.6.4, and 1.7.1.

CVE-2021-27400 hashicorp vulnerability CVSS: 5.0 22 Apr 2021, 17:15 UTC

HashiCorp Vault and Vault Enterprise Cassandra integrations (storage backend and database secrets engine plugin) did not validate TLS certificates when connecting to Cassandra clusters. Fixed in 1.6.4 and 1.7.1

CVE-2021-28156 hashicorp vulnerability CVSS: 5.0 20 Apr 2021, 16:15 UTC

HashiCorp Consul Enterprise version 1.8.0 up to 1.9.4 audit log can be bypassed by specifically crafted HTTP events. Fixed in 1.9.5, and 1.8.10.

CVE-2020-25864 hashicorp vulnerability CVSS: 4.3 20 Apr 2021, 16:15 UTC

HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.

CVE-2021-3153 hashicorp vulnerability CVSS: 4.0 26 Mar 2021, 03:16 UTC

HashiCorp Terraform Enterprise up to v202102-2 failed to enforce an organization-level setting that required users within an organization to have two-factor authentication enabled. Fixed in v202103-1.

CVE-2021-3283 hashicorp vulnerability CVSS: 5.0 01 Feb 2021, 16:15 UTC

HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3.

CVE-2021-3282 hashicorp vulnerability CVSS: 5.0 01 Feb 2021, 16:15 UTC

HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.

CVE-2021-3024 hashicorp vulnerability CVSS: 5.0 01 Feb 2021, 16:15 UTC

HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.

CVE-2020-25594 hashicorp vulnerability CVSS: 5.0 01 Feb 2021, 16:15 UTC

HashiCorp Vault and Vault Enterprise allowed for enumeration of Secrets Engine mount paths via unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.

CVE-2020-8567 hashicorp vulnerability CVSS: 4.0 21 Jan 2021, 17:15 UTC

Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.

CVE-2021-3121 hashicorp vulnerability CVSS: 7.5 11 Jan 2021, 06:15 UTC

An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.

CVE-2020-35453 hashicorp vulnerability CVSS: 5.0 17 Dec 2020, 05:15 UTC

HashiCorp Vault Enterprise’s Sentinel EGP policy feature incorrectly allowed requests to be processed in parent and sibling namespaces. Fixed in 1.5.6 and 1.6.1.

CVE-2020-35177 hashicorp vulnerability CVSS: 5.0 17 Dec 2020, 05:15 UTC

HashiCorp Vault and Vault Enterprise 1.4.1 and newer allowed the enumeration of users via the LDAP auth method. Fixed in 1.5.6 and 1.6.1.

CVE-2020-35192 hashicorp vulnerability CVSS: 10.0 17 Dec 2020, 02:15 UTC

The official vault docker images before 0.11.6 contain a blank password for a root user. System using the vault docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-29564 hashicorp vulnerability CVSS: 10.0 08 Dec 2020, 16:15 UTC

The official Consul Docker images 0.7.1 through 1.4.2 contain a blank password for a root user. System using the Consul Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-29529 hashicorp vulnerability CVSS: 5.0 03 Dec 2020, 20:15 UTC

HashiCorp go-slug up to 0.4.3 did not fully protect against directory traversal while unpacking tar archives, and protections could be bypassed with specific constructions of multiple symlinks. Fixed in 0.5.0.

CVE-2020-28348 hashicorp vulnerability CVSS: 6.3 24 Nov 2020, 03:15 UTC

HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8.

CVE-2020-28053 hashicorp vulnerability CVSS: 4.0 23 Nov 2020, 14:15 UTC

HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6.

CVE-2020-25201 hashicorp vulnerability CVSS: 5.0 04 Nov 2020, 23:15 UTC

HashiCorp Consul Enterprise version 1.7.0 up to 1.8.4 includes a namespace replication bug which can be triggered to cause denial of service via infinite Raft writes. Fixed in 1.7.9 and 1.8.5.

CVE-2020-27195 hashicorp vulnerability CVSS: 6.4 22 Oct 2020, 17:15 UTC

HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6

CVE-2020-25816 hashicorp vulnerability CVSS: 4.9 30 Sep 2020, 20:15 UTC

HashiCorp Vault and Vault Enterprise versions 1.0 and newer allowed leases created with a batch token to outlive their TTL because expiration time was not scheduled correctly. Fixed in 1.4.7 and 1.5.4.

CVE-2020-16251 hashicorp vulnerability CVSS: 7.5 26 Aug 2020, 15:15 UTC

HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.

CVE-2020-16250 hashicorp vulnerability CVSS: 7.5 26 Aug 2020, 15:15 UTC

HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..

CVE-2020-24359 hashicorp vulnerability CVSS: 5.0 20 Aug 2020, 17:15 UTC

HashiCorp vault-ssh-helper up to and including version 0.1.6 incorrectly accepted Vault-issued SSH OTPs for the subnet in which a host's network interface was located, rather than the specific IP address assigned to that interface. Fixed in 0.2.0.

CVE-2020-15511 hashicorp vulnerability CVSS: 5.0 30 Jul 2020, 14:15 UTC

HashiCorp Terraform Enterprise up to v202006-1 contained a default signup page that allowed user registration even when disabled, bypassing SAML enforcement. Fixed in v202007-1.

CVE-2020-13250 hashicorp vulnerability CVSS: 5.0 11 Jun 2020, 20:15 UTC

HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4.

CVE-2020-13170 hashicorp vulnerability CVSS: 5.0 11 Jun 2020, 20:15 UTC

HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.

CVE-2020-12797 hashicorp vulnerability CVSS: 5.0 11 Jun 2020, 20:15 UTC

HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.

CVE-2020-12758 hashicorp vulnerability CVSS: 5.0 11 Jun 2020, 20:15 UTC

HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.

CVE-2020-13223 hashicorp vulnerability CVSS: 5.0 10 Jun 2020, 19:15 UTC

HashiCorp Vault and Vault Enterprise logged proxy environment variables that potentially included sensitive credentials. Fixed in 1.3.6 and 1.4.2.

CVE-2020-12757 hashicorp vulnerability CVSS: 7.5 10 Jun 2020, 19:15 UTC

HashiCorp Vault and Vault Enterprise 1.4.0 and 1.4.1, when configured with the GCP Secrets Engine, may incorrectly generate GCP Credentials with the default time-to-live lease duration instead of the engine-configured setting. This may lead to generated GCP credentials being valid for longer than intended. Fixed in 1.4.2.

CVE-2020-10944 hashicorp vulnerability CVSS: 3.5 28 Apr 2020, 14:15 UTC

HashiCorp Nomad and Nomad Enterprise up to 0.10.4 contained a cross-site scripting vulnerability such that files from a malicious workload could cause arbitrary JavaScript to execute in the web UI. Fixed in 0.10.5.

CVE-2020-10661 hashicorp vulnerability CVSS: 5.8 23 Mar 2020, 13:15 UTC

HashiCorp Vault and Vault Enterprise versions 0.11.0 through 1.3.3 may, under certain circumstances, have existing nested-path policies grant access to Namespaces created after-the-fact. Fixed in 1.3.4.

CVE-2020-10660 hashicorp vulnerability CVSS: 4.3 23 Mar 2020, 13:15 UTC

HashiCorp Vault and Vault Enterprise versions 0.9.0 through 1.3.3 may, under certain circumstances, have an Entity's Group membership inadvertently include Groups the Entity no longer has permissions to. Fixed in 1.3.4.

CVE-2019-19879 hashicorp vulnerability CVSS: 5.0 14 Feb 2020, 17:15 UTC

HashiCorp Sentinel up to 0.10.1 incorrectly parsed negation in certain policy expressions. Fixed in 0.10.2.

CVE-2020-7956 hashicorp vulnerability CVSS: 7.5 31 Jan 2020, 13:15 UTC

HashiCorp Nomad and Nomad Enterprise up to 0.10.2 incorrectly validated role/region associated with TLS certificates used for mTLS RPC, and were susceptible to privilege escalation. Fixed in 0.10.3.

CVE-2020-7955 hashicorp vulnerability CVSS: 5.0 31 Jan 2020, 13:15 UTC

HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.

CVE-2020-7219 hashicorp vulnerability CVSS: 5.0 31 Jan 2020, 13:15 UTC

HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 1.6.3.

CVE-2020-7218 hashicorp vulnerability CVSS: 5.0 31 Jan 2020, 13:15 UTC

HashiCorp Nomad and Nonad Enterprise up to 0.10.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 0.10.3.

CVE-2020-7220 hashicorp vulnerability CVSS: 4.3 23 Jan 2020, 18:15 UTC

HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2.

CVE-2019-19316 hashicorp vulnerability CVSS: 4.3 02 Dec 2019, 21:15 UTC

When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP.

CVE-2019-12618 hashicorp vulnerability CVSS: 10.0 12 Aug 2019, 17:15 UTC

HashiCorp Nomad 0.9.0 through 0.9.1 has Incorrect Access Control via the exec driver.

CVE-2019-12291 hashicorp vulnerability CVSS: 6.4 06 Jun 2019, 17:29 UTC

HashiCorp Consul 1.4.0 through 1.5.0 has Incorrect Access Control. Keys not matching a specific ACL rule used for prefix matching in a policy can be deleted by a token using that policy even with default deny settings configured.

CVE-2019-9764 hashicorp vulnerability CVSS: 5.8 26 Mar 2019, 14:29 UTC

HashiCorp Consul 1.4.3 lacks server hostname verification for agent-to-agent TLS communication. In other words, the product behaves as if verify_server_hostname were set to false, even when it is actually set to true. This is fixed in 1.4.4.

CVE-2019-8336 hashicorp vulnerability CVSS: 6.8 05 Mar 2019, 23:29 UTC

HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "<hidden>" as its secret is used in unusual circumstances.

CVE-2018-19653 hashicorp vulnerability CVSS: 4.3 09 Dec 2018, 19:29 UTC

HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade.

CVE-2018-19786 hashicorp vulnerability CVSS: 4.3 05 Dec 2018, 09:29 UTC

HashiCorp Vault before 1.0.0 writes the master key to the server log in certain unusual or misconfigured scenarios in which incorrect data comes from the autoseal mechanism without an error being reported.

CVE-2018-15869 hashicorp vulnerability CVSS: 5.0 25 Aug 2018, 00:29 UTC

An Amazon Web Services (AWS) developer who does not specify the --owners flag when describing images via AWS CLI, and therefore not properly validating source software per AWS recommended security best practices, may unintentionally load an undesired and potentially malicious Amazon Machine Image (AMI) from the uncurated public community AMI catalog.

CVE-2017-16873 hashicorp vulnerability CVSS: 7.2 29 Mar 2018, 22:29 UTC

It is possible to exploit an unsanitized PATH in the suid binary that ships with vagrant-vmware-fusion 4.0.25 through 5.0.4 in order to escalate to root privileges.

CVE-2017-16839 hashicorp vulnerability CVSS: 6.9 29 Mar 2018, 22:29 UTC

Hashicorp vagrant-vmware-fusion 5.0.4 allows local users to steal root privileges if VMware Fusion is not installed.

CVE-2017-16512 hashicorp vulnerability CVSS: 7.2 29 Mar 2018, 22:29 UTC

The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 through 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available.

CVE-2018-9057 hashicorp vulnerability CVSS: 5.0 27 Mar 2018, 18:29 UTC

aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.

CVE-2017-16777 hashicorp vulnerability CVSS: 7.2 16 Nov 2017, 15:29 UTC

If HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.3 is installed but VMware Fusion is not, a local attacker can create a fake application directory and exploit the suid sudo helper in order to escalate to root.

CVE-2017-16001 hashicorp vulnerability CVSS: 7.2 06 Nov 2017, 17:29 UTC

In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.1, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges.

CVE-2017-15884 hashicorp vulnerability CVSS: 6.9 31 Oct 2017, 18:29 UTC

In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.0, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges.

CVE-2017-12579 hashicorp vulnerability CVSS: 7.2 19 Oct 2017, 13:29 UTC

An insecure suid wrapper binary in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 4.0.24 and earlier allows a non-root user to obtain a root shell.

CVE-2017-11741 hashicorp vulnerability CVSS: 7.2 08 Aug 2017, 19:29 UTC

HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before 4.0.24 uses weak permissions for the sudo helper scripts, allows local users to execute arbitrary code with root privileges by overwriting one of the scripts.

CVE-2017-7642 hashicorp vulnerability CVSS: 7.2 02 Aug 2017, 19:29 UTC

The sudo helper in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before 4.0.21 allows local users to gain root privileges by leveraging failure to verify the path to the encoded ruby script or scrub the PATH variable.