6.5
CVSSv3

CVE-2020-28053

Published: 23/11/2020 Updated: 25/10/2022
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hashicorp consul

Vendor Advisories

Debian Bug report logs - #975584 consul: CVE-2020-28053 Package: src:consul; Maintainer for src:consul is Debian Go Packaging Team <pkg-go-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 23 Nov 2020 20:36:02 UTC Severity: grave Tags: security, upstream Found in ...
HashiCorp Consul and Consul Enterprise 120 up to 185 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration when explicitly configured with the /v1/connect/ca/configuration endpoint, including the private key This allows the user to effectively privilege escalate by enabling the ability to mint ce ...