Vulnerability Description
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hashicorp | Vault | >= 1.2.0, < 1.16.12 |
| Openbao | Openbao | < 2.0.3 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-8185?
CVE-2024-8185 is a vulnerability with a CVSS score of 7.5 (HIGH). Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster joi...
How severe is CVE-2024-8185?
CVE-2024-8185 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8185?
Check the references section above for vendor advisories and patch information. Affected products include: Hashicorp Vault, Openbao Openbao.