2024-12-08 03:06:42 +00:00

60 lines
2.7 KiB
JSON

{
"id": "CVE-2024-8185",
"sourceIdentifier": "security@hashicorp.com",
"published": "2024-10-31T16:15:06.267",
"lastModified": "2024-11-01T12:57:03.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vault Community and Vault Enterprise (\u201cVault\u201d) clusters using Vault\u2019s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.\n\nThis vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12."
},
{
"lang": "es",
"value": "Los cl\u00fasteres Vault Community y Vault Enterprise (\u201cVault\u201d) que utilizan el backend de almacenamiento integrado de Vault son vulnerables a un ataque de denegaci\u00f3n de servicio (DoS) a trav\u00e9s del agotamiento de la memoria mediante un endpoint de la API de uni\u00f3n al cl\u00faster de Raft. Un atacante puede enviar un gran volumen de solicitudes al endpoint, lo que puede provocar que Vault consuma recursos excesivos de memoria del sistema, lo que puede provocar un bloqueo del sistema subyacente y del propio proceso de Vault. Esta vulnerabilidad, CVE-2024-8185, se corrigi\u00f3 en Vault Community 1.18.1 y Vault Enterprise 1.18.1, 1.17.8 y 1.16.12."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-636"
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2024-26-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-processing-raft-cluster-join-requests/71047",
"source": "security@hashicorp.com"
}
]
}