Vulnerability Description
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hashicorp | Vault | < 1.14.10 |
| Openbao | Openbao | < 2.0.0 |
Related Weaknesses (CWE)
References
- https://discuss.hashicorp.com/t/hcsec-2024-05-vault-cert-auth-method-did-not-corVendor Advisory
- https://security.netapp.com/advisory/ntap-20240524-0009/Third Party Advisory
- https://discuss.hashicorp.com/t/hcsec-2024-05-vault-cert-auth-method-did-not-corVendor Advisory
- https://security.netapp.com/advisory/ntap-20240524-0009/Third Party Advisory
FAQ
What is CVE-2024-2048?
CVE-2024-2048 is a vulnerability with a CVSS score of 8.1 (HIGH). Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration,...
How severe is CVE-2024-2048?
CVE-2024-2048 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2048?
Check the references section above for vendor advisories and patch information. Affected products include: Hashicorp Vault, Openbao Openbao.