First published: Tue Dec 08 2020(Updated: )
The official Consul Docker images 0.7.1 through 1.4.2 contain a blank password for a root user. System using the Consul Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | >=0.7.1<=1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29564 is considered a critical vulnerability due to the potential for remote attackers to achieve root access.
To fix CVE-2020-29564, update to a later version of the Consul Docker image that does not use a blank root password.
CVE-2020-29564 affects Consul Docker images ranging from versions 0.7.1 to 1.4.2.
CVE-2020-29564 can allow remote attackers to gain unauthorized root access to systems using the affected Consul Docker images.
Check if you are running any version of the Consul Docker image between 0.7.1 and 1.4.2 to determine vulnerability to CVE-2020-29564.