Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-36213 : Security Advisory and Response

Learn about CVE-2021-36213 affecting HashiCorp Consul and Consul Enterprise versions 1.9.0 through 1.10.0. Find out the impact, technical details, affected systems, and mitigation steps.

HashiCorp Consul and Consul Enterprise versions 1.9.0 through 1.10.0 are affected by a vulnerability where the default deny policy with a single L7 application-aware intention deny action fails, resulting in the intention incorrectly failing open and allowing L4 traffic. This issue has been addressed in versions 1.9.8 and 1.10.1.

Understanding CVE-2021-36213

This section delves into the details of CVE-2021-36213.

What is CVE-2021-36213?

The vulnerability in HashiCorp Consul and Consul Enterprise versions 1.9.0 through 1.10.0 results in the default deny policy with a single L7 application-aware intention deny action failing, leading to L4 traffic being allowed unintentionally.

The Impact of CVE-2021-36213

The impact of this vulnerability is significant as it can potentially allow unauthorized L4 traffic due to the failure of the intention deny action.

Technical Details of CVE-2021-36213

This section provides technical insights into CVE-2021-36213.

Vulnerability Description

The vulnerability arises from the default deny policy with a single L7 application-aware intention deny action failing in HashiCorp Consul and Consul Enterprise, leading to unintended L4 traffic access.

Affected Systems and Versions

HashiCorp Consul and Consul Enterprise versions 1.9.0 through 1.10.0 are confirmed to be affected by this vulnerability.

Exploitation Mechanism

Exploiting this vulnerability involves leveraging the incorrect failure of the intention deny action to allow unauthorized L4 traffic.

Mitigation and Prevention

In this section, we discuss how to mitigate and prevent the CVE-2021-36213 vulnerability.

Immediate Steps to Take

Users are advised to upgrade their HashiCorp Consul and Consul Enterprise installations to versions 1.9.8 and 1.10.1 to remediate the vulnerability.

Long-Term Security Practices

Implementing strict access control policies and regularly monitoring network traffic can help in detecting and preventing similar vulnerabilities in the future.

Patching and Updates

Stay vigilant for security advisories from HashiCorp and promptly apply patches and updates to ensure your systems are secure.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now