First published: Tue Mar 26 2019(Updated: )
HashiCorp Consul 1.4.3 lacks server hostname verification for agent-to-agent TLS communication. In other words, the product behaves as if verify_server_hostname were set to false, even when it is actually set to true. This is fixed in 1.4.4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | =1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9764 is a vulnerability in HashiCorp Consul 1.4.3 that allows for agent-to-agent TLS communication without proper server hostname verification.
The vulnerability in HashiCorp Consul 1.4.3 allows for potential man-in-the-middle attacks due to the lack of server hostname verification for agent-to-agent TLS communication.
CVE-2019-9764 has a severity rating of 7.4 (high).
To fix the vulnerability in HashiCorp Consul 1.4.3, you should update to version 1.4.4 or later, which provides the necessary server hostname verification for agent-to-agent TLS communication.
You can find more information about CVE-2019-9764 on the official GitHub page of HashiCorp Consul: https://github.com/hashicorp/consul/issues/5519