Количество 6
Количество 6

CVE-2024-7594
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.

CVE-2024-7594
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.

ROS-20250630-02
Уязвимость vault
GHSA-jg74-mwgw-v6x3
Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default

BDU:2025-08603
Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильным назначением разрешений для критического ресурса, позволяющая нарушителю обойти процесс аутентификации

SUSE-SU-2024:3911-1
Security update for govulncheck-vulndb
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-7594 Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15. | CVSS3: 7.5 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-7594 Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15. | CVSS3: 7.5 | 0% Низкий | 12 месяцев назад |
![]() | ROS-20250630-02 Уязвимость vault | CVSS3: 7.5 | 0% Низкий | 3 месяца назад |
GHSA-jg74-mwgw-v6x3 Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default | CVSS3: 7.5 | 0% Низкий | 12 месяцев назад | |
![]() | BDU:2025-08603 Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильным назначением разрешений для критического ресурса, позволяющая нарушителю обойти процесс аутентификации | CVSS3: 7.5 | 0% Низкий | 12 месяцев назад |
![]() | SUSE-SU-2024:3911-1 Security update for govulncheck-vulndb | 10 месяцев назад |
Уязвимостей на страницу