First published: Thu Sep 14 2023(Updated: )
HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.
Credit: security@hashicorp.com security@hashicorp.com security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/vault | >=1.14.0<1.14.3 | 1.14.3 |
go/github.com/hashicorp/vault | >=1.13.0<1.13.7 | 1.13.7 |
go/github.com/hashicorp/vault | >=1.6.0<1.12.11 | 1.12.11 |
HashiCorp Vault | >=1.6.0<1.12.11 | |
HashiCorp Vault | >=1.6.0<1.12.11 | |
HashiCorp Vault | >=1.13.0<1.13.7 | |
HashiCorp Vault | >=1.13.0<1.13.7 | |
HashiCorp Vault | >=1.14.0<1.14.3 | |
HashiCorp Vault | >=1.14.0<1.14.3 | |
>=1.6.0<1.12.11 | ||
>=1.6.0<1.12.11 | ||
>=1.13.0<1.13.7 | ||
>=1.13.0<1.13.7 | ||
>=1.14.0<1.14.3 | ||
>=1.14.0<1.14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4680 is a vulnerability in HashiCorp Vault and Vault Enterprise transit secrets engine that allowed authorized users to specify arbitrary nonces.
CVE-2023-4680 has a severity keyword of 'medium' and a severity value of 6.8.
CVE-2023-4680 affects HashiCorp Vault and Vault Enterprise versions 1.6.0 to 1.12.11, 1.13.0 to 1.13.7, and 1.14.0 to 1.14.3.
The remedy for CVE-2023-4680 in HashiCorp Vault is to upgrade to version 1.14.3 (for versions 1.14.0 to 1.14.2), 1.13.7 (for versions 1.13.0 to 1.13.6), or 1.12.11 (for versions 1.6.0 to 1.12.10).
CVE-2023-4680 can be exploited by using the encrypt endpoint in combination with an offline attack to decrypt arbitrary ciphertext and potentially derive the authentication secrets.