Vulnerability Description
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hashicorp | Consul | >= 0.5.1, <= 1.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/hashicorp/consul/pull/5069Issue TrackingPatchThird Party Advisory
- https://groups.google.com/forum/#%21topic/consul-tool/7TCw06oio0I
- https://github.com/hashicorp/consul/pull/5069Issue TrackingPatchThird Party Advisory
- https://groups.google.com/forum/#%21topic/consul-tool/7TCw06oio0I
FAQ
What is CVE-2018-19653?
CVE-2018-19653 is a vulnerability with a CVSS score of 5.9 (MEDIUM). HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented. NOTE: the vendor has provided reconfiguration step...
How severe is CVE-2018-19653?
CVE-2018-19653 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19653?
Check the references section above for vendor advisories and patch information. Affected products include: Hashicorp Consul.