CVE-2020-12757
moderate-risk
Published 2020-06-10
HashiCorp Vault and Vault Enterprise 1.4.0 and 1.4.1, when configured with the GCP Secrets Engine, may incorrectly generate GCP Credentials with the default time-to-live lease duration instead of the engine-configured setting. This may lead to generated GCP credentials being valid for longer than intended. Fixed in 1.4.2.
Do I need to act?
-
0.51% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 18f1c494be8b06788c2fdda1a4296eb3c4b174ce, 18f1c494be8b06788c2fdda1a4296eb3c4b174ce
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (4)
Vendor Advisory
https://www.hashicorp.com/blog/category/vault/
Vendor Advisory
https://www.hashicorp.com/blog/category/vault/
41
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
7/34 · Low