CVE-2021-45042
moderate-risk
Published 2021-12-17
In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8.6, and 1.9.x before 1.9.1, clusters using the Integrated Storage backend allowed an authenticated user (with write permissions to a kv secrets engine) to cause a panic and denial of service of the storage backend. The earliest affected version is 1.4.0.
Do I need to act?
-
0.43% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.9/10
Medium
NETWORK
/ LOW complexity
Affected Vendors
References (6)
Third Party Advisory
https://security.gentoo.org/glsa/202207-01
Third Party Advisory
https://security.gentoo.org/glsa/202207-01
32
/ 100
moderate-risk
Severity
20/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
10/34 · Low