CVE Vulnerabilities

CVE-2021-32923

Insufficient Session Expiration

Published: Jun 03, 2021 | Modified: Oct 25, 2022
CVSS 3.x
7.4
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Ubuntu

HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Vault Hashicorp 0.10.0 (including) 1.5.9 (excluding)
Vault Hashicorp 1.6.0 (including) 1.6.5 (excluding)
Vault Hashicorp 1.7.0 (including) 1.7.2 (excluding)

Potential Mitigations

References