CVE-2021-27400
- EPSS 0.24%
- Published 22.04.2021 17:15:07
- Last modified 21.11.2024 05:57:55
HashiCorp Vault and Vault Enterprise Cassandra integrations (storage backend and database secrets engine plugin) did not validate TLS certificates when connecting to Cassandra clusters. Fixed in 1.6.4 and 1.7.1
CVE-2021-3282
- EPSS 0.3%
- Published 01.02.2021 16:15:13
- Last modified 21.11.2024 06:21:12
HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.
CVE-2021-3024
- EPSS 0.48%
- Published 01.02.2021 16:15:13
- Last modified 21.11.2024 06:20:46
HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
CVE-2020-25594
- EPSS 0.48%
- Published 01.02.2021 16:15:12
- Last modified 21.11.2024 05:18:11
HashiCorp Vault and Vault Enterprise allowed for enumeration of Secrets Engine mount paths via unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
CVE-2020-35453
- EPSS 0.33%
- Published 17.12.2020 05:15:10
- Last modified 21.11.2024 05:27:18
HashiCorp Vault Enterprise’s Sentinel EGP policy feature incorrectly allowed requests to be processed in parent and sibling namespaces. Fixed in 1.5.6 and 1.6.1.
CVE-2020-35177
- EPSS 0.4%
- Published 17.12.2020 05:15:10
- Last modified 21.11.2024 05:26:54
HashiCorp Vault and Vault Enterprise 1.4.1 and newer allowed the enumeration of users via the LDAP auth method. Fixed in 1.5.6 and 1.6.1.
- EPSS 2.01%
- Published 17.12.2020 02:15:13
- Last modified 21.11.2024 05:26:55
The official vault docker images before 0.11.6 contain a blank password for a root user. System using the vault docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank passwor...
CVE-2020-25816
- EPSS 0.44%
- Published 30.09.2020 20:15:15
- Last modified 21.11.2024 05:18:49
HashiCorp Vault and Vault Enterprise versions 1.0 and newer allowed leases created with a batch token to outlive their TTL because expiration time was not scheduled correctly. Fixed in 1.4.7 and 1.5.4.
CVE-2020-16251
- EPSS 0.92%
- Published 26.08.2020 15:15:12
- Last modified 21.11.2024 05:07:01
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.
CVE-2020-16250
- EPSS 1.39%
- Published 26.08.2020 15:15:12
- Last modified 21.11.2024 05:07:01
HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..