CVE-2023-2816

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.7 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
hashicorpconsul
1.15.0 ≤
𝑥
< 1.15.3
hashicorpconsul
1.15.0 ≤
𝑥
< 1.15.3
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
hashicorpconsul
1.15.0 ≤
𝑥
≤ 1.15.2
ADP
hashicorpconsul
1.15.0 ≤
𝑥
≤ 1.15.2
ADP
Debian logo
Debian Releases
Debian Product
Codename
consul
bullseye
1.8.7+dfsg1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
consul
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
dne
mantic
ignored
noble
dne
oracular
dne
trusty
ignored
xenial
ignored