578
VMScore

CVE-2021-37219

Published: 07/09/2021 Updated: 08/09/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hashicorp consul

Vendor Advisories

Debian Bug report logs - #1015218 consul: CVE-2021-37219 CVE-2021-38698 CVE-2022-29153 Package: src:consul; Maintainer for src:consul is Debian Go Packaging Team <pkg-go-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 17 Jul 2022 20:03:02 UTC Severity: grave Tags: sec ...
Debian Bug report logs - #1017982 consul: CVE-2022-29153 Package: src:consul; Maintainer for src:consul is Debian Go Packaging Team <pkg-go-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 17 Jul 2022 20:03:02 UTC Severity: grave Tags: security, upstream Reply or ...
HashiCorp Consul and Consul Enterprise 1101 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation Fixed in 1815, 199 and 1102 ...
In HashiCorp Consul before version 1102, the Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation ...