// For flags

CVE-2022-40186

vault: Vault Entity Alias Metadata May Leak Between Aliases With The Same Name Assigned To The Same Entity

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.

Se ha detectado un problema en HashiCorp Vault y Vault Enterprise versiones anteriores a 1.11.3. Se ha encontrado una vulnerabilidad en el Motor de Identidades por la que, en una implementación en la que una entidad presenta varios accesos de montaje con nombres de alias compartidos, Vault puede sobrescribir los metadatos en el alias incorrecto debido a un problema de comprobación del alias correcto asignado a una entidad. Esto puede permitir un acceso involuntario a las rutas de clave/valor usando esos metadatos en Vault

A flaw was found in HashiCorp Vault and Vault Enterprise, where they could allow a locally authenticated attacker to gain unauthorized access to the system, caused by a flaw in the alias naming schema implementation for mount accessors with shared alias names in the Identity Engine. By conducting a specially-crafted operation, an attacker can overwrite metadata to the wrong alias, gaining unauthorized access to key/value paths using the metadata in Vault.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-08 CVE Reserved
  • 2022-09-22 CVE Published
  • 2024-04-14 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hashicorp
Search vendor "Hashicorp"
Vault
Search vendor "Hashicorp" for product "Vault"
>= 1.8.0 < 1.9.9
Search vendor "Hashicorp" for product "Vault" and version " >= 1.8.0 < 1.9.9"
-
Affected
Hashicorp
Search vendor "Hashicorp"
Vault
Search vendor "Hashicorp" for product "Vault"
>= 1.8.0 < 1.9.9
Search vendor "Hashicorp" for product "Vault" and version " >= 1.8.0 < 1.9.9"
enterprise
Affected
Hashicorp
Search vendor "Hashicorp"
Vault
Search vendor "Hashicorp" for product "Vault"
>= 1.10.0 < 1.10.6
Search vendor "Hashicorp" for product "Vault" and version " >= 1.10.0 < 1.10.6"
-
Affected
Hashicorp
Search vendor "Hashicorp"
Vault
Search vendor "Hashicorp" for product "Vault"
>= 1.10.0 < 1.10.6
Search vendor "Hashicorp" for product "Vault" and version " >= 1.10.0 < 1.10.6"
enterprise
Affected
Hashicorp
Search vendor "Hashicorp"
Vault
Search vendor "Hashicorp" for product "Vault"
>= 1.11.0 < 1.11.3
Search vendor "Hashicorp" for product "Vault" and version " >= 1.11.0 < 1.11.3"
-
Affected
Hashicorp
Search vendor "Hashicorp"
Vault
Search vendor "Hashicorp" for product "Vault"
>= 1.11.0 < 1.11.3
Search vendor "Hashicorp" for product "Vault" and version " >= 1.11.0 < 1.11.3"
enterprise
Affected