Description
Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values of client tokens and token accessors being stored in the audit log. This vulnerability, CVE-2024-8365, was fixed in Vault Community Edition and Vault Enterprise 1.17.5 and Vault Enterprise 1.16.9.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
- Attack Vector
- network
- Complexity
- low
- Privileges
- high
- User Action
- required
- Scope
- changed
- Confidentiality
- high
- Integrity
- none
- Availability
- none
- Weaknesses
- CWE-532CWE-532
Metadata
- Primary Vendor
- HASHICORP
- Published
- 9/2/2024
- Last Modified
- 9/4/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
hashicorp : vaulthashicorp : vaulthashicorp : vault
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.