First published: Sun Dec 09 2018(Updated: )
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | >=0.5.1<=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this HashiCorp Consul vulnerability is CVE-2018-19653.
The severity of CVE-2018-19653 is medium with a severity value of 5.9.
HashiCorp Consul versions 0.5.1 through 1.4.0 are affected by CVE-2018-19653.
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented.
CVE-2018-19653 can be mitigated by following the reconfiguration steps provided by the vendor that do not require a software upgrade.