Hashicorp

Vault

72 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.6%
  • Veröffentlicht 26.09.2024 20:15:07
  • Zuletzt bearbeitet 13.11.2025 17:51:32

Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized use...

  • EPSS 0.35%
  • Veröffentlicht 02.09.2024 05:15:17
  • Zuletzt bearbeitet 04.09.2024 14:37:03

Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values...

  • EPSS 0.4%
  • Veröffentlicht 11.07.2024 21:15:12
  • Zuletzt bearbeitet 13.08.2025 14:01:26

Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not...

  • EPSS 0.28%
  • Veröffentlicht 12.06.2024 19:15:51
  • Zuletzt bearbeitet 04.11.2025 17:16:15

Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing a...

  • EPSS 0.05%
  • Veröffentlicht 30.04.2024 15:15:52
  • Zuletzt bearbeitet 08.08.2025 18:45:12

Vault Enterprise, when configured with performance standby nodes and a configured audit device, will inadvertently log request headers on the standby node. These logs may have included sensitive HTTP request information in cleartext. This vulnerabil...

  • EPSS 0.7%
  • Veröffentlicht 04.04.2024 18:15:14
  • Zuletzt bearbeitet 08.08.2025 19:00:18

Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. This vulnerability, CVE-2024-2660, affects Vault and Vault Enterprise 1.14.0 and above, and is fixed in V...

  • EPSS 0.25%
  • Veröffentlicht 04.03.2024 20:15:50
  • Zuletzt bearbeitet 13.11.2025 17:51:43

Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious cert...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 01.02.2024 02:15:46
  • Zuletzt bearbeitet 21.11.2024 08:47:28

Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `lo...

  • EPSS 1%
  • Veröffentlicht 08.12.2023 22:15:07
  • Zuletzt bearbeitet 13.02.2025 18:16:08

HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request...

  • EPSS 0.6%
  • Veröffentlicht 09.11.2023 21:15:25
  • Zuletzt bearbeitet 21.11.2024 08:42:51

HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.