#VU73246 Improper access control in Vault and Vault Enterprise


Vulnerability identifier: #VU73246

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-24999

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Vault
Web applications / Modules and components for CMS
Vault Enterprise
Web applications / Modules and components for CMS

Vendor: HashiCorp

Description

The vulnerability allows a remote user to perform a denial of service attack.

The vulnerability exists due to the way the application handles authentication based on Approle SecretID. A remote user with access to the "/auth/approle/role/:role_name/secret-id-accessor/destroy" endpoint can destroy the secret ID of any other role by providing the secret ID accessor and disable access to Vault for other users.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Vault: 1.12.0 - 1.12.3, 1.11.0 - 1.11.7, 1.10.0 - 1.10.10, 1.9.0 - 1.9.10, 1.8.0 - 1.8.12, 1.7.0 - 1.7.10, 1.6.0 - 1.6.7, 1.5.0 - 1.5.9, 1.4.0 - 1.4.7, 1.2.0 - 1.2.7, 1.3.0 - 1.3.10, 1.1.0 - 1.1.5, 1.0.0 - 1.0.3

Vault Enterprise: 1.12.0 - 1.12.3, 1.11.0 - 1.11.7, 1.10.0 - 1.10.10, 1.9.0 - 1.9.10, 1.8.0 - 1.8.12, 1.7.0 - 1.7.10, 1.6.0 - 1.6.7, 1.5.0 - 1.5.9, 1.4.0 - 1.4.7, 1.2.0 - 1.2.7, 1.3.0 - 1.3.10, 1.1.0 - 1.1.5, 1.0.0 - 1.0.3


External links
http://discuss.hashicorp.com/t/hcsec-2023-07-vault-fails-to-verify-if-approle-secretid-belongs-to-role-during-a-destroy-operation/51305


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability