cve/2024/CVE-2024-9180.md

20 lines
956 B
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-9180](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9180)
![](https://img.shields.io/static/v1?label=Product&message=Vault%20Enterprise&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Vault&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0.10.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-266%3A%20Incorrect%20Privilege%20Assignment&color=brightgreen)
### Description
A privileged Vault operator with write permissions to the root namespaces identity endpoint could escalate their own or another users privileges to Vaults root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds