Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
2024-10-31T16:15:06.267
2025-11-13T17:40:36.950
Analyzed
CVSSv3.1: 7.5 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | hashicorp | vault | < 1.16.12 | Yes |
| Application | hashicorp | vault | < 1.18.1 | Yes |
| Application | hashicorp | vault | < 1.17.8 | Yes |
| Application | hashicorp | vault | 1.18.0 | Yes |
| Application | openbao | openbao | < 2.0.3 | Yes |