First published: Fri Sep 23 2022(Updated: )
HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/consul | >=1.13.0<1.13.2 | 1.13.2 |
go/github.com/hashicorp/consul | >=1.12.0<1.12.5 | 1.12.5 |
go/github.com/hashicorp/consul | <1.11.9 | 1.11.9 |
HashiCorp Consul | <1.11.9 | |
HashiCorp Consul | <1.11.9 | |
HashiCorp Consul | >=1.12.0<1.12.5 | |
HashiCorp Consul | >=1.12.0<1.12.5 | |
HashiCorp Consul | >=1.13.0<1.13.2 | |
HashiCorp Consul | >=1.13.0<1.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-40716 is medium with a severity value of 6.5.
CVE-2022-40716 affects HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2.
CVE-2022-40716 is a vulnerability that allows bypassing service mesh intentions through a specially crafted CSR.
To fix CVE-2022-40716, update HashiCorp Consul and Consul Enterprise to version 1.11.9, 1.12.5, or 1.13.2.
You can find more information about CVE-2022-40716 on the NIST NVD website, the HashiCorp discussions forum, and the GitHub pull request.