// For flags

CVE-2024-2660

Vault TLS Cert Auth Method Did Not Correctly Validate OCSP Responses

Severity Score

6.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. Fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11.

El método de autenticación de los certificados TLS de Vault y Vault Enterprise no validaba correctamente las respuestas de OCSP cuando se configuraban uno o más orígenes de OCSP. Se corrigió en Vault 1.16.0 y Vault Enterprise 1.16.1, 1.15.7 y 1.14.11.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-03-19 CVE Reserved
  • 2024-04-04 CVE Published
  • 2024-04-05 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-703: Improper Check or Handling of Exceptional Conditions
CAPEC
  • CAPEC-26: Leveraging Race Conditions
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
HashiCorp
Search vendor "HashiCorp"
Vault
Search vendor "HashiCorp" for product "Vault"
>= 1.14.0 < 1.16.0
Search vendor "HashiCorp" for product "Vault" and version " >= 1.14.0 < 1.16.0"
en
Affected
HashiCorp
Search vendor "HashiCorp"
Vault Enterprise
Search vendor "HashiCorp" for product "Vault Enterprise"
>= 1.14.0 < 1.16.0
Search vendor "HashiCorp" for product "Vault Enterprise" and version " >= 1.14.0 < 1.16.0"
en
Affected