Description
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Published: 2024-02-05
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0734 Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Github GHSA Github GHSA GHSA-vh73-q3rw-qx7w Boundary vulnerable to session hijacking through TLS certificate tampering
History

No history.

Subscriptions

Hashicorp Boundary
cve-icon MITRE

Status: PUBLISHED

Assigner: HashiCorp

Published:

Updated: 2024-08-01T18:26:30.420Z

Reserved: 2024-01-29T20:35:33.313Z

Link: CVE-2024-1052

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.420Z

cve-icon NVD

Status : Modified

Published: 2024-02-05T21:15:11.640

Modified: 2024-11-21T08:49:41.313

Link: CVE-2024-1052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses