Hashicorp

Vault

72 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 11.03.2023 00:15:09
  • Zuletzt bearbeitet 21.11.2024 07:48:54

HashiCorp Vault and Vault Enterprise’s approle auth method allowed any authenticated user with access to an approle destroy endpoint to destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability is fixed in Vault ...

  • EPSS 0.2%
  • Veröffentlicht 12.10.2022 21:15:09
  • Zuletzt bearbeitet 15.05.2025 15:16:03

HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the role's CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been ret...

  • EPSS 0.34%
  • Veröffentlicht 22.09.2022 01:15:12
  • Zuletzt bearbeitet 27.05.2025 18:15:29

An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata ...

  • EPSS 0.75%
  • Veröffentlicht 26.07.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 07:12:27

HashiCorp Vault Enterprise 1.7.0 through 1.9.7, 1.10.4, and 1.11.0 clusters using Integrated Storage expose an unauthenticated API endpoint that could be abused to override the voter status of a node within a Vault HA cluster, introducing potential f...

  • EPSS 0.36%
  • Veröffentlicht 17.05.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 07:03:10

HashiCorp Vault and Vault Enterprise from 1.10.0 to 1.10.2 did not correctly configure and enforce MFA on login after server restarts. This affects the Login MFA feature introduced in Vault and Vault Enterprise 1.10.0 and does not affect the separate...

  • EPSS 0.28%
  • Veröffentlicht 10.03.2022 17:47:06
  • Zuletzt bearbeitet 21.11.2024 06:51:52

Vault Enterprise clusters using the tokenization transform feature can expose the tokenization key through the tokenization key configuration endpoint to authorized operators with `read` permissions on this endpoint. Fixed in Vault Enterprise 1.9.4, ...

  • EPSS 0.18%
  • Veröffentlicht 10.03.2022 17:47:06
  • Zuletzt bearbeitet 21.11.2024 06:51:51

"Vault and Vault Enterprise 1.8.0 through 1.8.8, and 1.9.3 allowed the PKI secrets engine under certain configurations to issue wildcard certificates to authorized users for a specified domain, even if the PKI role policy attribute allow_subdomains i...

  • EPSS 0.44%
  • Veröffentlicht 17.12.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:31:51

In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8.6, and 1.9.x before 1.9.1, clusters using the Integrated Storage backend allowed an authenticated user (with write permissions to a kv secrets engine) to cause a panic and denial ...

  • EPSS 0.26%
  • Veröffentlicht 30.11.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:30:10

HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorre...

  • EPSS 0.19%
  • Veröffentlicht 11.10.2021 03:15:06
  • Zuletzt bearbeitet 21.11.2024 06:27:20

HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read p...