CVE-2022-40716

EUVD-2022-6870
HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CISA-ADPADP
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 57%
Affected Products (NVD)
VendorProductVersion
hashicorpconsul
𝑥
< 1.11.9
hashicorpconsul
𝑥
< 1.11.9
hashicorpconsul
1.12.0 ≤
𝑥
< 1.12.5
hashicorpconsul
1.12.0 ≤
𝑥
< 1.12.5
hashicorpconsul
1.13.0 ≤
𝑥
< 1.13.2
hashicorpconsul
1.13.0 ≤
𝑥
< 1.13.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
consul
bullseye
vulnerable
buster
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
consul
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
dne
mantic
ignored
noble
dne
trusty
dne
xenial
dne