This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3041 | Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12. |
Github GHSA |
GHSA-g233-2p4r-3q7v | Hashicorp Vault vulnerable to denial of service through memory exhaustion |
Thu, 13 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openbao
Openbao openbao |
|
| CPEs | cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openbao
Openbao openbao |
Thu, 07 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:* cpe:2.3:a:hashicorp:vault:1.18.0:*:*:*:enterprise:*:*:* |
Fri, 01 Nov 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 31 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashicorp
Hashicorp vault |
|
| CPEs | cpe:2.3:a:hashicorp:vault:*:*:*:*:community:*:*:* cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:* |
|
| Vendors & Products |
Hashicorp
Hashicorp vault |
|
| Metrics |
ssvc
|
Thu, 31 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12. | |
| Title | Vault Vulnerable to Denial of Service When Processing Raft Join Requests | |
| Weaknesses | CWE-636 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2024-10-31T17:11:35.647Z
Reserved: 2024-08-26T16:24:04.547Z
Link: CVE-2024-8185
Updated: 2024-10-31T16:58:16.160Z
Status : Analyzed
Published: 2024-10-31T16:15:06.267
Modified: 2025-11-13T17:40:36.950
Link: CVE-2024-8185
OpenCVE Enrichment
No data.
EUVD
Github GHSA