First published: Tue Feb 15 2022(Updated: )
Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vault | <=3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25186 is classified as a high-severity vulnerability due to the potential unauthorized access to Vault secrets.
To fix CVE-2022-25186, upgrade to Jenkins HashiCorp Vault Plugin version 3.8.1 or later.
CVE-2022-25186 is a security vulnerability that allows agent processes to retrieve any Vault secrets.
Jenkins users running HashiCorp Vault Plugin versions 3.8.0 and earlier are affected by CVE-2022-25186.
The risks of CVE-2022-25186 include potential exposure and misuse of sensitive Vault secrets by attackers controlling agent processes.