Vulnerabilities > Hashicorp > Consul > 1.4.0

DATE CVE VULNERABILITY TITLE RISK
2020-06-11 CVE-2020-13170 Improper Input Validation vulnerability in Hashicorp Consul
HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled.
network
low complexity
hashicorp CWE-20
7.5
2020-06-11 CVE-2020-12797 Unspecified vulnerability in Hashicorp Consul
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers.
network
low complexity
hashicorp
5.3
2020-01-31 CVE-2020-7219 Allocation of Resources Without Limits or Throttling vulnerability in Hashicorp Consul
HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service.
network
low complexity
hashicorp CWE-770
7.5
2019-06-06 CVE-2019-12291 Unspecified vulnerability in Hashicorp Consul
HashiCorp Consul 1.4.0 through 1.5.0 has Incorrect Access Control.
network
low complexity
hashicorp
7.5
2019-03-05 CVE-2019-8336 Unspecified vulnerability in Hashicorp Consul 1.4.0/1.4.1/1.4.2
HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "<hidden>" as its secret is used in unusual circumstances.
network
high complexity
hashicorp
8.1
2018-12-09 CVE-2018-19653 Cryptographic Issues vulnerability in Hashicorp Consul
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented.
network
high complexity
hashicorp CWE-310
5.9