
Cloud Vulnerability DB
A community-led vulnerabilities database
HashiCorp Vault and Vault Enterprise versions 0.11.0 through 1.3.3 may, under certain circumstances, have existing nested-path policies grant access to Namespaces created after-the-fact. This vulnerability (CVE-2020-10661) was discovered and disclosed in March 2020, with a fix provided in version 1.3.4 (Vault Changelog).
The vulnerability has been assigned a CVSS v3.1 Base Score of 9.1 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). The issue affects both the open-source Vault and Enterprise editions, specifically impacting the nested-path policies functionality and its interaction with Namespace access controls (NVD).
The vulnerability could potentially allow unauthorized access to Namespaces created after policy implementation, leading to a significant security breach in access controls. This could result in unauthorized access to sensitive data and potential privilege escalation within the Vault environment (NVD).
The recommended mitigation is to upgrade to HashiCorp Vault version 1.3.4 or later, which contains the fix for this vulnerability. Organizations running affected versions should prioritize this upgrade to prevent potential unauthorized access to their Vault infrastructure (Vault Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."