{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T15:06:03.951","vulnerabilities":[{"cve":{"id":"CVE-2024-8185","sourceIdentifier":"security@hashicorp.com","published":"2024-10-31T16:15:06.267","lastModified":"2025-11-13T17:40:36.950","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.\n\nThis vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12."},{"lang":"es","value":"Los clústeres Vault Community y Vault Enterprise (“Vault”) que utilizan el backend de almacenamiento integrado de Vault son vulnerables a un ataque de denegación de servicio (DoS) a través del agotamiento de la memoria mediante un endpoint de la API de unión al clúster de Raft. Un atacante puede enviar un gran volumen de solicitudes al endpoint, lo que puede provocar que Vault consuma recursos excesivos de memoria del sistema, lo que puede provocar un bloqueo del sistema subyacente y del propio proceso de Vault. Esta vulnerabilidad, CVE-2024-8185, se corrigió en Vault Community 1.18.1 y Vault Enterprise 1.18.1, 1.17.8 y 1.16.12."}],"metrics":{"cvssMetricV31":[{"source":"security@hashicorp.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@hashicorp.com","type":"Secondary","description":[{"lang":"en","value":"CWE-636"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.2.0","versionEndExcluding":"1.16.12","matchCriteriaId":"DB67F465-3F0B-4CC8-B789-B8409A53E744"},{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*","versionStartIncluding":"1.2.0","versionEndExcluding":"1.18.1","matchCriteriaId":"8B42214F-20DE-4A4F-BFD6-D37DD7E54216"},{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.17.0","versionEndExcluding":"1.17.8","matchCriteriaId":"AB513412-962A-47C5-A4CE-65E07CB427E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:1.18.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"0F3539C1-C27D-4ED1-8658-56BBE565EFCE"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.3","matchCriteriaId":"9AF7F4E0-53DA-4F85-B896-468E73211B54"}]}]}],"references":[{"url":"https://discuss.hashicorp.com/t/hcsec-2024-26-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-processing-raft-cluster-join-requests/71047","source":"security@hashicorp.com","tags":["Vendor Advisory"]}]}}]}