CVE Vulnerabilities

CVE-2024-8185

Not Failing Securely ('Failing Open')

Published: Oct 31, 2024 | Modified: Aug 07, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu

Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.

This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.

Weakness

When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.

Affected Software

Name Vendor Start Version End Version
Vault Hashicorp 1.2.0 (including) 1.16.12 (excluding)
Vault Hashicorp 1.2.0 (including) 1.18.1 (excluding)
Vault Hashicorp 1.17.0 (including) 1.17.8 (excluding)
Vault Hashicorp 1.18.0 (including) 1.18.0 (including)

Potential Mitigations

References