First published: Mon Feb 01 2021(Updated: )
HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vault | <1.5.7 | |
HashiCorp Vault | <1.5.7 | |
HashiCorp Vault | >=1.6.0<1.6.2 | |
HashiCorp Vault | >=1.6.0<1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this HashiCorp Vault vulnerability is CVE-2021-3024.
The severity of CVE-2021-3024 is medium with a CVSS score of 5.3.
The affected software includes HashiCorp Vault versions up to 1.5.7 and versions between 1.6.0 and 1.6.2, both Vault and Vault Enterprise editions.
The CVE-2021-3024 vulnerability can be fixed by updating HashiCorp Vault to version 1.6.2 or 1.5.7.
More information about CVE-2021-3024 can be found in the following references: [link1](https://discuss.hashicorp.com/t/hcsec-2021-02-vault-api-endpoint-exposed-internal-ip-address-without-authentication/20334), [link2](https://security.gentoo.org/glsa/202207-01).