First published: Fri Jun 02 2023(Updated: )
Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3
Credit: security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | >=1.13.0<1.14.7 | |
HashiCorp Consul | >=1.13.0<1.14.7 | |
HashiCorp Consul | >=1.15.0<1.15.3 | |
HashiCorp Consul | >=1.15.0<1.15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Consul vulnerability is CVE-2023-1297.
The severity of CVE-2023-1297 is high with a severity value of 7.5.
Consul and Consul Enterprise versions between 1.13.0 and 1.14.7, as well as versions between 1.15.0 and 1.15.3, are affected by CVE-2023-1297.
To fix the CVE-2023-1297 vulnerability, Consul users should upgrade to Consul versions 1.14.5 or 1.15.3.
More information about the CVE-2023-1297 vulnerability can be found at the following reference: https://discuss.hashicorp.com/t/hcsec-2023-15-consul-cluster-peering-can-result-in-denial-of-service/54515.