HomeHashicorpCVE-2024-8185

CVE-2024-8185

HIGH
7.5CVSS
Published: 2024-10-31
Updated: 2025-11-13
AI Analysis

Description

Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-636

Metadata

Primary Vendor
HASHICORP
Published
10/31/2024
Last Modified
11/13/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

hashicorp : vaulthashicorp : vaulthashicorp : vaulthashicorp : vaultopenbao : openbao

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-8185 | HIGH Severity | CVEDatabase.com | CVEDatabase.com