Vulnerabilities > Hashicorp

DATE CVE VULNERABILITY TITLE RISK
2019-06-06 CVE-2019-12291 Unspecified vulnerability in Hashicorp Consul
HashiCorp Consul 1.4.0 through 1.5.0 has Incorrect Access Control.
network
low complexity
hashicorp
6.4
2019-03-26 CVE-2019-9764 Origin Validation Error vulnerability in Hashicorp Consul 1.4.3
HashiCorp Consul 1.4.3 lacks server hostname verification for agent-to-agent TLS communication.
network
hashicorp CWE-346
5.8
2019-03-05 CVE-2019-8336 Unspecified vulnerability in Hashicorp Consul 1.4.0/1.4.1/1.4.2
HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "<hidden>" as its secret is used in unusual circumstances.
network
hashicorp
6.8
2018-12-09 CVE-2018-19653 Cryptographic Issues vulnerability in Hashicorp Consul
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented.
network
high complexity
hashicorp CWE-310
5.9
2018-12-05 CVE-2018-19786 Information Exposure Through Log Files vulnerability in Hashicorp Vault
HashiCorp Vault before 1.0.0 writes the master key to the server log in certain unusual or misconfigured scenarios in which incorrect data comes from the autoseal mechanism without an error being reported.
network
hashicorp CWE-532
4.3
2018-08-25 CVE-2018-15869 Incorrect Permission Assignment for Critical Resource vulnerability in Hashicorp Packer
An Amazon Web Services (AWS) developer who does not specify the --owners flag when describing images via AWS CLI, and therefore not properly validating source software per AWS recommended security best practices, may unintentionally load an undesired and potentially malicious Amazon Machine Image (AMI) from the uncurated public community AMI catalog.
network
low complexity
hashicorp CWE-732
5.0
2018-03-29 CVE-2017-16873 Unspecified vulnerability in Hashicorp Vagrant VMWare Fusion
It is possible to exploit an unsanitized PATH in the suid binary that ships with vagrant-vmware-fusion 4.0.25 through 5.0.4 in order to escalate to root privileges.
local
low complexity
hashicorp
7.2
2018-03-29 CVE-2017-16839 Unspecified vulnerability in Hashicorp Vagrant VMWare Fusion 5.0.4
Hashicorp vagrant-vmware-fusion 5.0.4 allows local users to steal root privileges if VMware Fusion is not installed.
local
hashicorp
6.9
2018-03-29 CVE-2017-16512 Race Condition vulnerability in Hashicorp Vagrant VMWare Fusion 5.0.2/5.0.3/5.0.4
The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 through 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available.
local
low complexity
hashicorp CWE-362
7.2
2018-03-27 CVE-2018-9057 Insufficient Entropy in PRNG vulnerability in Hashicorp Terraform
aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.
network
low complexity
hashicorp CWE-332
5.0