First published: Wed Aug 09 2023(Updated: )
A vulnerability was identified in Consul such that using JWT authentication for service mesh incorrectly allows/denies access regardless of service identities. This vulnerability, CVE-2023-3518, affects Consul 1.16.0 and was fixed in 1.16.1.
Credit: security@hashicorp.com security@hashicorp.com security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | =1.16.0 | |
HashiCorp Consul | =1.16.0 | |
HashiCorp Consul | =1.16.0-rc1 | |
go/github.com/hashicorp/consul | =1.16.0 | 1.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3518 is a vulnerability in HashiCorp Consul and Consul Enterprise 1.16.0 that allows/denies access regardless of service identities when using JWT Auth for service mesh.
CVE-2023-3518 has a severity rating of 7.4 (high).
CVE-2023-3518 affects HashiCorp Consul and Consul Enterprise 1.16.0 versions when using JWT Auth for service mesh.
You can fix CVE-2023-3518 by upgrading to version 1.16.1 of HashiCorp Consul or Consul Enterprise.
You can find more information about CVE-2023-3518 at the following link: https://discuss.hashicorp.com/t/hcsec-2023-25-consul-jwt-auth-in-l7-intentions-allow-for-mismatched-service-identity-and-jwt-providers/57004