First published: Wed Aug 26 2020(Updated: )
A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM identities and roles may be manipulated and bypass authentication.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/vault | >=1.4.0<1.4.4 | 1.4.4 |
go/github.com/hashicorp/vault | >=1.3.0<1.3.8 | 1.3.8 |
go/github.com/hashicorp/vault | >=0.8.1<1.2.5 | 1.2.5 |
go/github.com/hashicorp/vault | >=1.5.0<1.5.1 | 1.5.1 |
HashiCorp Vault | >=0.7.1<1.2.5 | |
HashiCorp Vault | >=0.7.1<1.2.5 | |
HashiCorp Vault | >=1.3.0<1.3.8 | |
HashiCorp Vault | >=1.3.0<1.3.8 | |
HashiCorp Vault | >=1.4.0<1.4.4 | |
HashiCorp Vault | >=1.4.0<1.4.4 | |
HashiCorp Vault | >=1.5.0<1.5.1 | |
HashiCorp Vault | >=1.5.0<1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-16250.
The severity level of CVE-2020-16250 is high, with a CVSS score of 8.2.
HashiCorp Vault versions 0.7.1 and newer are affected by CVE-2020-16250.
To fix the vulnerability CVE-2020-16250, update HashiCorp Vault to versions 1.2.5, 1.3.8, 1.4.4, or 1.5.1.
You can find more information about CVE-2020-16250 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2020-16250) and NVD website (https://nvd.nist.gov/vuln/detail/CVE-2020-16250).