Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8185

Опубликовано: 31 окт. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.

A flaw was found in HashiCorp Vault. Clusters using Vault’s Integrated Storage backend are vulnerable to a denial of service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint. This flaw allows an attacker to send a large volume of requests to the endpoint, which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.

Отчет

This vulnerability is rated as important severity because it allows attackers to exploit the Raft cluster join API in HashiCorp Vault, leading to denial of service through memory exhaustion. The ability to send a high volume of requests can overwhelm system resources, potentially crashing both the Vault process and the underlying system

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Openshift Container Storage 4ocs4/cephcsi-rhel8Affected
Red Hat Openshift Container Storage 4ocs4/mcg-rhel8-operatorAffected
Red Hat Openshift Container Storage 4ocs4/ocs-must-gather-rhel8Affected
Red Hat Openshift Container Storage 4ocs4/ocs-rhel8-operatorAffected
Red Hat Openshift Container Storage 4ocs4/rook-ceph-rhel8-operatorAffected
Red Hat Openshift Data Foundation 4odf4/cephcsi-rhel9Not affected
Red Hat Openshift Data Foundation 4odf4/mcg-cli-rhel9Not affected
Red Hat Openshift Data Foundation 4odf4/mcg-rhel9-operatorNot affected
Red Hat Openshift Data Foundation 4odf4/ocs-metrics-exporter-rhel9Not affected
Red Hat Openshift Data Foundation 4odf4/ocs-must-gather-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-636
https://bugzilla.redhat.com/show_bug.cgi?id=2322958hashicorp/vault: Vault Vulnerable to Denial of Service When Processing Raft Join Requests

EPSS

Процентиль: 33%
0.00124
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
8 месяцев назад

Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.

CVSS3: 7.5
github
8 месяцев назад

Hashicorp Vault vulnerable to denial of service through memory exhaustion

CVSS3: 7.5
fstec
8 месяцев назад

Уязвимость алгоритма распределения данных Raft Consensus Algorithm хранилища Integrated storage (Raft) платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
7 месяцев назад

Уязвимость vault

suse-cvrf
8 месяцев назад

Security update for govulncheck-vulndb

EPSS

Процентиль: 33%
0.00124
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-8185