
Cloud Vulnerability DB
A community-led vulnerabilities database
HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. This vulnerability (CVE-2021-37218) was fixed in Nomad versions 1.0.10 and 1.1.4 (HashiCorp Discussion).
The vulnerability exists in Nomad's mTLS implementation for agent communication between Nomad client and server agents. While mTLS provides encrypted and authenticated RPC channels, the authentication logic failed to properly restrict client agents from accessing server-only Raft RPC functionality. Using a non-server certificate from the configured Nomad CA allowed unauthorized access to server-only Raft RPC functions (HashiCorp Discussion).
This vulnerability allows client agents to escalate privileges by directly communicating with the server agent's Raft RPC layer, potentially gaining unauthorized access to server-only functionality (HashiCorp Discussion).
Users should upgrade to Nomad or Nomad Enterprise versions 1.0.10, 1.1.4, or newer. The fix includes modifications to Nomad's RPC authentication logic to correctly enforce server-only access for the Raft RPC layer (HashiCorp Discussion).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."