CVE-2024-8185

Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*
cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:vault:1.18.0:*:*:*:enterprise:*:*:*

Configuration 2 (hide)

cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*

History

13 Nov 2025, 17:40

Type Values Removed Values Added
CPE cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*
First Time Openbao openbao
Openbao

Information

Published : 2024-10-31 16:15

Updated : 2025-11-13 17:40


NVD link : CVE-2024-8185

Mitre link : CVE-2024-8185

CVE.ORG link : CVE-2024-8185


JSON object : View

Products Affected

openbao

  • openbao

hashicorp

  • vault
CWE
CWE-636

Not Failing Securely ('Failing Open')