First published: Mon Feb 05 2024(Updated: )
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Credit: security@hashicorp.com security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/boundary | >=0.8.0<0.15.0 | 0.15.0 |
HashiCorp Boundary | >=0.8.0<0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1052 is considered a critical vulnerability due to its potential for session hijacking.
To resolve CVE-2024-1052, upgrade to Boundary version 0.15.0 or later.
CVE-2024-1052 affects systems running HashiCorp Boundary versions between 0.8.0 and 0.15.0.
Exploiting CVE-2024-1052 allows attackers to hijack user sessions, potentially compromising sensitive data.
Attackers can target any user with active or pending sessions in affected instances of HashiCorp Boundary.