CVE-2024-1052:
Boundary vulnerable to session hijacking through TLS certificate tampering
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53153%
CWE
Published
2/5/2024
Updated
2/5/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/hashicorp/boundary | go | >= 0.8.0, < 0.15.0 | 0.15.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability information describes an improper certificate validation
issue (CWE-295) where Boundary's TLS certificate validation
allowed crafted certificates to hijack sessions. While the root cause appears to be in certificate verification logic that didn't enforce byte-for-byte certificate matching (fixed in 0.15.0), the available data lacks specific code references, commit diffs, or function names
from the HashiCorp/Boundary
repository. Without concrete evidence of the exact functions
handling certificate generation, storage, or validation
(e.g., TLS handshake verification routines or TOFU token checks), identifying specific vulnerable functions
with high confidence is not possible.