First published: Fri Sep 15 2023(Updated: )
HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/vault | >=1.14.0<1.14.3 | 1.14.3 |
go/github.com/hashicorp/vault | >=1.13.0<1.13.7 | 1.13.7 |
go/github.com/hashicorp/vault | >=1.6.0<1.12.11 | 1.12.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-v84f-6r39-cpfc is medium with a severity value of 6.8.
To fix GHSA-v84f-6r39-cpfc, upgrade to version 1.14.3 if using version 1.14.0 to 1.14.2, version 1.13.7 if using version 1.13.0 to 1.13.6, or version 1.12.11 if using version 1.6.0 to 1.12.10.
The vulnerability ID for GHSA-v84f-6r39-cpfc is CVE-2023-4680.
GHSA-v84f-6r39-cpfc affects HashiCorp Vault and Vault Enterprise transit secrets engine.
The CWE for GHSA-v84f-6r39-cpfc is CWE-20.