
Cloud Vulnerability DB
A community-led vulnerabilities database
Nomad Community and Nomad Enterprise ('Nomad') event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces. The vulnerability was discovered and disclosed on February 12, 2025, affecting Nomad Community Edition versions from 1.0.0 up to 1.9.5 and Nomad Enterprise versions from 1.0.0 up to 1.9.5, 1.8.9, and 1.7.17 (HashiCorp Discuss).
The vulnerability exists in the event stream endpoint of Nomad, which is used to stream the server's backlog of events and new events as they occur. The issue specifically relates to how ACL wildcards are validated when the event stream namespace parameter is set to wildcard (*). The vulnerability emerges from a discrepancy in how ACL wildcards are validated, allowing potential bypass of intended access restrictions (HashiCorp Discuss).
The vulnerability allows unauthorized access to read events from namespaces that would otherwise be restricted by ACL policies. When exploited, an attacker could potentially access sensitive information from other namespaces that they should not have permission to view (HashiCorp Discuss).
The vulnerability has been fixed in Nomad Community Edition version 1.9.6 and Nomad Enterprise versions 1.9.6, 1.8.10, and 1.7.18. Users are advised to upgrade to these patched versions. Organizations should evaluate the risk associated with this issue and follow the Nomad upgrade guides for version-specific upgrade notes (HashiCorp Discuss).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."