Описание
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.
This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
A flaw was found in HashiCorp Vault. Clusters using Vault’s Integrated Storage backend are vulnerable to a denial of service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint. This flaw allows an attacker to send a large volume of requests to the endpoint, which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.
Отчет
This vulnerability is rated as important severity because it allows attackers to exploit the Raft cluster join API in HashiCorp Vault, leading to denial of service through memory exhaustion. The ability to send a high volume of requests can overwhelm system resources, potentially crashing both the Vault process and the underlying system
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Openshift Container Storage 4 | ocs4/cephcsi-rhel8 | Affected | ||
Red Hat Openshift Container Storage 4 | ocs4/mcg-rhel8-operator | Affected | ||
Red Hat Openshift Container Storage 4 | ocs4/ocs-must-gather-rhel8 | Affected | ||
Red Hat Openshift Container Storage 4 | ocs4/ocs-rhel8-operator | Affected | ||
Red Hat Openshift Container Storage 4 | ocs4/rook-ceph-rhel8-operator | Affected | ||
Red Hat Openshift Data Foundation 4 | odf4/cephcsi-rhel9 | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/mcg-cli-rhel9 | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/mcg-rhel9-operator | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/ocs-metrics-exporter-rhel9 | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/ocs-must-gather-rhel8 | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Hashicorp Vault vulnerable to denial of service through memory exhaustion
Уязвимость алгоритма распределения данных Raft Consensus Algorithm хранилища Integrated storage (Raft) платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.5 High
CVSS3