6.8
CVE-2026-2808
- EPSS 0.02%
- Veröffentlicht 11.03.2026 23:08:32
- Zuletzt bearbeitet 12.03.2026 21:07:53
- Quelle security@hashicorp.com
- CVE-Watchlists
- Unerledigt
HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul 1.18.21, 1.21.11 and 1.22.5.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerHashiCorp
≫
Produkt
Consul
Default Statusunaffected
Version <
1.22.5
Version
0
Status
affected
HerstellerHashiCorp
≫
Produkt
Consul Enterprise
Default Statusunaffected
Version <
1.22.5
Version
0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.059 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@hashicorp.com | 6.8 | 2.3 | 4 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.