Vulnerability Description
HashiCorp Vault Enterprise 1.7.0 through 1.9.7, 1.10.4, and 1.11.0 clusters using Integrated Storage expose an unauthenticated API endpoint that could be abused to override the voter status of a node within a Vault HA cluster, introducing potential for future data loss or catastrophic failure. Fixed in Vault Enterprise 1.9.8, 1.10.5, and 1.11.1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hashicorp | Vault | >= 1.7.0, <= 1.9.7 |
Related Weaknesses (CWE)
References
- https://discuss.hashicorp.comVendor Advisory
- https://discuss.hashicorp.com/t/hcsec-2022-15-vault-enterprise-does-not-verify-eVendor Advisory
- https://security.netapp.com/advisory/ntap-20220901-0011/
- https://discuss.hashicorp.comVendor Advisory
- https://discuss.hashicorp.com/t/hcsec-2022-15-vault-enterprise-does-not-verify-eVendor Advisory
- https://security.netapp.com/advisory/ntap-20220901-0011/
FAQ
What is CVE-2022-36129?
CVE-2022-36129 is a vulnerability with a CVSS score of 9.1 (CRITICAL). HashiCorp Vault Enterprise 1.7.0 through 1.9.7, 1.10.4, and 1.11.0 clusters using Integrated Storage expose an unauthenticated API endpoint that could be abused to override the voter status of a node ...
How severe is CVE-2022-36129?
CVE-2022-36129 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-36129?
Check the references section above for vendor advisories and patch information. Affected products include: Hashicorp Vault.