First published: Sat Jul 17 2021(Updated: )
HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy proxy TLS configuration does not validate destination service identity in the encoded subject alternative name. Fixed in 1.8.14, 1.9.8, and 1.10.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | >=1.3.0<1.8.14 | |
HashiCorp Consul | >=1.3.0<1.8.14 | |
HashiCorp Consul | >=1.9.0<1.9.8 | |
HashiCorp Consul | >=1.9.0<1.9.8 | |
HashiCorp Consul | >=1.10.0<1.10.1 | |
HashiCorp Consul | >=1.10.0<1.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32574 is a vulnerability in HashiCorp Consul and Consul Enterprise versions 1.3.0 through 1.10.0 where the Envoy proxy TLS configuration does not validate destination service identity.
CVE-2021-32574 has a severity level of 7.5, which is considered high.
CVE-2021-32574 affects HashiCorp Consul and Consul Enterprise versions 1.3.0 through 1.10.0.
To fix CVE-2021-32574, update your HashiCorp Consul or Consul Enterprise installation to version 1.8.14, 1.9.8, or 1.10.1, as these versions contain the fix.
You can find more information about CVE-2021-32574 in the following references: [1] [2] [3]