First published: Fri Dec 17 2021(Updated: )
In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8.6, and 1.9.x before 1.9.1, clusters using the Integrated Storage backend allowed an authenticated user (with write permissions to a kv secrets engine) to cause a panic and denial of service of the storage backend. The earliest affected version is 1.4.0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vault | >=1.4.0<1.7.7 | |
HashiCorp Vault | >=1.4.0<1.7.7 | |
HashiCorp Vault | >=1.8.0<1.8.6 | |
HashiCorp Vault | >=1.8.0<1.8.6 | |
HashiCorp Vault | =1.9.0 | |
HashiCorp Vault | =1.9.0 | |
>=1.4.0<1.7.7 | ||
>=1.4.0<1.7.7 | ||
>=1.8.0<1.8.6 | ||
>=1.8.0<1.8.6 | ||
=1.9.0 | ||
=1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45042 is a vulnerability in HashiCorp Vault and Vault Enterprise before versions 1.7.7, 1.8.6, and 1.9.1.
CVE-2021-45042 allows an authenticated user with write permissions to a kv secrets engine to cause a panic and denial of service of the storage backend.
The severity of CVE-2021-45042 is medium with a CVSS score of 4.9.
HashiCorp Vault and Vault Enterprise versions before 1.7.7, 1.8.6, and 1.9.1 are affected.
To fix CVE-2021-45042, upgrade to HashiCorp Vault versions 1.7.7, 1.8.6, or 1.9.1.