First published: Sat Jul 17 2021(Updated: )
HashiCorp Consul and Consul Enterprise 1.9.0 through 1.10.0 default deny policy with a single L7 application-aware intention deny action cancels out, causing the intention to incorrectly fail open, allowing L4 traffic. Fixed in 1.9.8 and 1.10.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | >=1.9.0<1.9.8 | |
HashiCorp Consul | >=1.9.0<1.9.8 | |
HashiCorp Consul | >=1.10.0<1.10.1 | |
HashiCorp Consul | >=1.10.0<1.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36213
The severity of CVE-2021-36213 is high with a severity value of 7.5.
HashiCorp Consul and Consul Enterprise versions 1.9.0 through 1.10.0 are affected by CVE-2021-36213.
You can fix CVE-2021-36213 by upgrading to HashiCorp Consul and Consul Enterprise versions 1.9.8 or 1.10.1.
You can find more information about CVE-2021-36213 at the following references: [Reference 1](https://discuss.hashicorp.com/t/hcsec-2021-16-consul-s-application-aware-intentions-deny-action-fails-open-when-combined-with-default-deny-policy/26855), [Reference 2](https://github.com/hashicorp/consul/releases/tag/v1.10.1), [Reference 3](https://security.gentoo.org/glsa/202208-09).