HomeHashicorpCVE-2024-8365

CVE-2024-8365

MEDIUM
6.2CVSS
Published: 2024-09-02
Updated: 2024-09-04
AI Analysis

Description

Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values of client tokens and token accessors being stored in the audit log. This vulnerability, CVE-2024-8365, was fixed in Vault Community Edition and Vault Enterprise 1.17.5 and Vault Enterprise 1.16.9.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
high
User Action
required
Scope
changed
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
CWE-532CWE-532

Metadata

Primary Vendor
HASHICORP
Published
9/2/2024
Last Modified
9/4/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

hashicorp : vaulthashicorp : vaulthashicorp : vault

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-8365 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com