#VU96652 Inclusion of Sensitive Information in Log Files in Vault and Vault Enterprise - CVE-2024-8365

 

#VU96652 Inclusion of Sensitive Information in Log Files in Vault and Vault Enterprise - CVE-2024-8365

Published: September 2, 2024


Vulnerability identifier: #VU96652
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-8365
CWE-ID: CWE-532
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Vault
Vault Enterprise
Software vendor:
HashiCorp

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores plaintext values instead of their HMAC hash equivalent for Vault tokens, client tokens, and other sensitive data in audit device. A local user can gain access to sensitive information.


Remediation

Install updates from vendor's website.

External links