CVE-2021-3282: Improper Authentication in HashiCorp Vault
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.4979%
CWE
Published
1/31/2024
Updated
1/31/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/hashicorp/vault | go | >= 1.6.0, < 1.6.2 | 1.6.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the raftStoragePaths endpoint configuration in logical_system_raft.go. The commit diff shows the operation handler for 'remove-peer' was changed from wrapHandleRaftRemovePeer(b) to b.verifyDROperationToken(b.handleRaftRemovePeerUpdate(), false). This indicates the original implementation (via wrapHandleRaftRemovePeer) did not include the verifyDROperationToken authentication check. The vulnerable handleRaftRemovePeerUpdate function was exposed through this unauthenticated path in affected versions, specifically impacting DR secondaries where authentication should be required for raft operator commands.