Description
HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2037 | HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2. |
Github GHSA |
GHSA-ccw8-7688-vqx4 | HashiCorp Consul Privilege Escalation Vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:16:03.813Z
Reserved: 2021-07-21T00:00:00.000Z
Link: CVE-2021-37219
No data.
Status : Modified
Published: 2021-09-07T12:15:07.727
Modified: 2024-11-21T06:14:53.253
Link: CVE-2021-37219
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA