CVE-2021-43415
Nomad vulnerability analysis and mitigation

Overview

HashiCorp Nomad and Nomad Enterprise up to versions 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. The vulnerability was discovered and disclosed on November 22, 2021, and was assigned identifier CVE-2021-43415. The issue was fixed in versions 1.0.14, 1.1.8, and 1.2.1 (HashiCorp Discussion).

Technical details

The vulnerability allowed a Nomad job using the QEMU task driver to bypass intended restrictions on the source of the image on the host by exploiting QEMU's -drive CLI flag as an argument in the submitted job. The QEMU task driver's args functionality could potentially facilitate further access to resources on the host. To address this, Nomad's QEMU task driver configuration logic was modified to provide operators with increased control over access to host resources by restricting the QEMU CLI flags available to job submitters through a new args_allowlist option (HashiCorp Discussion).

Impact

The vulnerability allowed authenticated users with job submission capabilities to bypass the configured allowed paths for images in the QEMU task driver. This could potentially lead to unauthorized access to the underlying host filesystem and resources (HashiCorp Discussion).

Mitigation and workarounds

Organizations should upgrade to Nomad or Nomad Enterprise versions 1.0.14, 1.1.8, 1.2.1, or newer. After upgrading, operators need to configure client agents with the new argsallowlist option, permitting only necessary QEMU CLI flags. Alternatively, the QEMU task driver can be disabled entirely using the plugin configuration. For example, the argsallowlist can be configured as: plugin 'qemu' { config { imagepaths = ["/mnt/image/paths"] argsallowlist = ["-drive", "-usbdevice"] } } (HashiCorp Discussion).

Additional resources


SourceThis report was generated using AI

Related Nomad vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-4922HIGH8.1
  • NomadNomad
  • cpe:2.3:a:hashicorp:nomad
NoYesJun 11, 2025
CVE-2025-3744HIGH7.6
  • NomadNomad
  • cpe:2.3:a:hashicorp:nomad
NoYesMay 13, 2025
CVE-2025-0937HIGH7.1
  • NomadNomad
  • cpe:2.3:a:hashicorp:nomad
NoYesFeb 12, 2025
CVE-2025-1296MEDIUM6.5
  • NomadNomad
  • github.com/hashicorp/nomad
NoYesMar 10, 2025
CVE-2024-12678MEDIUM6.5
  • NomadNomad
  • github.com/hashicorp/nomad
NoYesDec 20, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management