CVE-2024-8185

Source
https://cve.org/CVERecord?id=CVE-2024-8185
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-8185.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-8185
Aliases
Downstream
Related
Published
2024-10-31T16:15:06.267Z
Modified
2026-03-12T17:25:02.648313Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.

This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.

References

Affected packages

Git / github.com/hashicorp/vault

Affected ranges

Type
GIT
Repo
https://github.com/hashicorp/vault
Events
Introduced
Fixed
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "1.2.0"
        },
        {
            "fixed": "1.18.1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.18.0"
        }
    ]
}
Type
GIT
Repo
https://github.com/openbao/openbao
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.0.3"
        }
    ]
}

Affected versions

api/auth/approle/v0.*
api/auth/approle/v0.1.0
api/auth/approle/v0.1.1
api/auth/approle/v0.2.0
api/auth/approle/v0.3.0
api/auth/approle/v0.4.0
api/auth/approle/v0.4.1
api/auth/approle/v0.5.0
api/auth/approle/v0.6.0
api/auth/approle/v0.7.0
api/auth/approle/v0.8.0
api/auth/approle/v1.*
api/auth/approle/v1.1.0-development20240408
api/auth/aws/v0.*
api/auth/aws/v0.1.0
api/auth/aws/v0.2.0
api/auth/aws/v0.3.0
api/auth/aws/v0.4.0
api/auth/aws/v0.4.1
api/auth/aws/v0.5.0
api/auth/aws/v0.6.0
api/auth/aws/v0.7.0
api/auth/aws/v0.8.0
api/auth/aws/v1.*
api/auth/aws/v1.1.0-development20240408
api/auth/azure/v0.*
api/auth/azure/v0.1.0
api/auth/azure/v0.2.0
api/auth/azure/v0.3.0
api/auth/azure/v0.4.0
api/auth/azure/v0.4.1
api/auth/azure/v0.5.0
api/auth/azure/v0.6.0
api/auth/azure/v0.7.0
api/auth/azure/v1.*
api/auth/azure/v1.1.0-development20240408
api/auth/gcp/v0.*
api/auth/gcp/v0.1.0
api/auth/gcp/v0.2.0
api/auth/gcp/v0.3.0
api/auth/gcp/v0.4.0
api/auth/gcp/v0.4.1
api/auth/gcp/v0.5.0
api/auth/gcp/v0.6.0
api/auth/gcp/v0.7.0
api/auth/gcp/v0.8.0
api/auth/gcp/v1.*
api/auth/gcp/v1.1.0-development20240408
api/auth/kubernetes/v0.*
api/auth/kubernetes/v0.1.0
api/auth/kubernetes/v0.2.0
api/auth/kubernetes/v0.3.0
api/auth/kubernetes/v0.4.0
api/auth/kubernetes/v0.4.1
api/auth/kubernetes/v0.5.0
api/auth/kubernetes/v0.6.0
api/auth/kubernetes/v0.7.0
api/auth/kubernetes/v0.8.0
api/auth/kubernetes/v1.*
api/auth/kubernetes/v1.1.0-development20240408
api/auth/ldap/v0.*
api/auth/ldap/v0.1.0
api/auth/ldap/v0.2.0
api/auth/ldap/v0.3.0
api/auth/ldap/v0.4.0
api/auth/ldap/v0.4.1
api/auth/ldap/v0.5.0
api/auth/ldap/v0.6.0
api/auth/ldap/v0.7.0
api/auth/ldap/v0.8.0
api/auth/ldap/v1.*
api/auth/ldap/v1.1.0-development20240408
api/auth/userpass/v0.*
api/auth/userpass/v0.1.0
api/auth/userpass/v0.2.0
api/auth/userpass/v0.3.0
api/auth/userpass/v0.4.0
api/auth/userpass/v0.4.1
api/auth/userpass/v0.5.0
api/auth/userpass/v0.6.0
api/auth/userpass/v0.7.0
api/auth/userpass/v0.8.0
api/auth/userpass/v1.*
api/auth/userpass/v1.1.0-development20240408
api/v1.*
api/v1.0.1
api/v1.0.2
api/v1.0.3
api/v1.0.4
api/v1.1.1
api/v1.10.0
api/v1.100.0-development20240408
api/v1.11.0
api/v1.12.0
api/v1.12.1
api/v1.12.2
api/v1.13.0
api/v1.14.0
api/v1.15.0
api/v1.2.0
api/v1.3.1
api/v1.5.0
api/v1.6.0
api/v1.7.0
api/v1.7.1
api/v1.7.2
api/v1.8.0
api/v1.8.1
api/v1.8.2
api/v1.8.3
api/v1.9.0
api/v1.9.1
api/v1.9.2
Other
before-plugin-removal
fork-point
last-go-modable
main-creation
sdk/v0.*
sdk/v0.1.10
sdk/v0.1.11
sdk/v0.1.12
sdk/v0.1.13
sdk/v0.1.8
sdk/v0.1.9
sdk/v0.10.0
sdk/v0.10.1
sdk/v0.11.0
sdk/v0.11.1
sdk/v0.12.0
sdk/v0.13.0
sdk/v0.14.0
sdk/v0.2.1
sdk/v0.3.0
sdk/v0.4.1
sdk/v0.5.0
sdk/v0.5.1
sdk/v0.5.3
sdk/v0.6.0
sdk/v0.6.1
sdk/v0.6.2
sdk/v0.7.0
sdk/v0.8.0
sdk/v0.9.0
sdk/v0.9.1
sdk/v0.9.2
sdk/v1.*
sdk/v1.100.0-development20240408
v1.*
v1.18.0
v1.18.0-rc1
v1.2.0
v2.*
v2.0.0
v2.0.0-alpha20240329
v2.0.0-beta20240618
v2.0.1
v2.0.2

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "1.2.0"
            },
            {
                "fixed": "1.16.12"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "1.17.0"
            },
            {
                "fixed": "1.17.8"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-8185.json"