CVE-2024-7594
- EPSS 0.6%
- Veröffentlicht 26.09.2024 20:15:07
- Zuletzt bearbeitet 13.11.2025 17:51:32
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized use...
CVE-2024-8365
- EPSS 0.35%
- Veröffentlicht 02.09.2024 05:15:17
- Zuletzt bearbeitet 04.09.2024 14:37:03
Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values...
CVE-2024-6468
- EPSS 0.4%
- Veröffentlicht 11.07.2024 21:15:12
- Zuletzt bearbeitet 13.08.2025 14:01:26
Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not...
CVE-2024-5798
- EPSS 0.28%
- Veröffentlicht 12.06.2024 19:15:51
- Zuletzt bearbeitet 04.11.2025 17:16:15
Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing a...
CVE-2024-2877
- EPSS 0.05%
- Veröffentlicht 30.04.2024 15:15:52
- Zuletzt bearbeitet 08.08.2025 18:45:12
Vault Enterprise, when configured with performance standby nodes and a configured audit device, will inadvertently log request headers on the standby node. These logs may have included sensitive HTTP request information in cleartext. This vulnerabil...
CVE-2024-2660
- EPSS 0.7%
- Veröffentlicht 04.04.2024 18:15:14
- Zuletzt bearbeitet 08.08.2025 19:00:18
Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. This vulnerability, CVE-2024-2660, affects Vault and Vault Enterprise 1.14.0 and above, and is fixed in V...
CVE-2024-2048
- EPSS 0.25%
- Veröffentlicht 04.03.2024 20:15:50
- Zuletzt bearbeitet 13.11.2025 17:51:43
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious cert...
CVE-2024-0831
- EPSS 0.32%
- Veröffentlicht 01.02.2024 02:15:46
- Zuletzt bearbeitet 21.11.2024 08:47:28
Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `lo...
CVE-2023-6337
- EPSS 1%
- Veröffentlicht 08.12.2023 22:15:07
- Zuletzt bearbeitet 13.02.2025 18:16:08
HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request...
CVE-2023-5954
- EPSS 0.6%
- Veröffentlicht 09.11.2023 21:15:25
- Zuletzt bearbeitet 21.11.2024 08:42:51
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.