CVE-2023-0665
Vault PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata
Severity Score
6.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
A flaw was found in the Hashicorp vault. Vault’s PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in a denial of service of the PKI mount. This bug did not affect public or private key material, trust chains, or certificate issuance.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-02-03 CVE Reserved
- 2023-03-30 CVE Published
- 2024-08-02 CVE Updated
- 2024-10-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-285: Improper Authorization
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20230526-0008 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://discuss.hashicorp.com/t/hcsec-2023-11-vault-s-pki-issuer-endpoint-did-not-correctly-authorize-access-to-issuer-metadata/52079/1 | 2023-05-26 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-0665 | 2023-10-31 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2182981 | 2023-10-31 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | < 1.11.9 Search vendor "Hashicorp" for product "Vault" and version " < 1.11.9" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | < 1.11.9 Search vendor "Hashicorp" for product "Vault" and version " < 1.11.9" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.12.0 < 1.12.5 Search vendor "Hashicorp" for product "Vault" and version " >= 1.12.0 < 1.12.5" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.12.0 < 1.12.5 Search vendor "Hashicorp" for product "Vault" and version " >= 1.12.0 < 1.12.5" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.13.0 < 1.13.1 Search vendor "Hashicorp" for product "Vault" and version " >= 1.13.0 < 1.13.1" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.13.0 < 1.13.1 Search vendor "Hashicorp" for product "Vault" and version " >= 1.13.0 < 1.13.1" | enterprise |
Affected
|