First published: Tue Sep 07 2021(Updated: )
HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | <1.8.15 | |
HashiCorp Consul | <1.8.15 | |
HashiCorp Consul | >=1.9.0<1.9.9 | |
HashiCorp Consul | >=1.9.0<1.9.9 | |
HashiCorp Consul | >=1.10.0<1.10.2 | |
HashiCorp Consul | >=1.10.0<1.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for HashiCorp Consul and Consul Enterprise is CVE-2021-37219.
CVE-2021-37219 has a severity level of 8.8 (High).
Versions 1.8.15, 1.9.0 to 1.9.9, and 1.10.0 to 1.10.2 of HashiCorp Consul and Consul Enterprise are affected by CVE-2021-37219.
The vulnerability in HashiCorp Consul and Consul Enterprise can be fixed by updating to version 1.8.15, 1.9.9, or 1.10.2.
You can find more information about CVE-2021-37219 on the HashiCorp discussion forum, Gentoo Security Advisory, and HashiCorp blog.