{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0831","assignerOrgId":"67fedba0-ff2e-4543-ba5b-aa93e87718cc","state":"PUBLISHED","assignerShortName":"HashiCorp","dateReserved":"2024-01-23T17:42:40.228Z","datePublished":"2024-02-01T01:41:33.801Z","dateUpdated":"2025-02-13T17:27:29.010Z"},"containers":{"cna":{"providerMetadata":{"orgId":"67fedba0-ff2e-4543-ba5b-aa93e87718cc","shortName":"HashiCorp","dateUpdated":"2024-02-23T16:06:01.441Z"},"title":"Vault May Expose Sensitive Information When Configuring An Audit Log Device","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-532","description":"CWE-532: Insertion of Sensitive Information into Log File","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-268","descriptions":[{"lang":"en","value":"CAPEC-268 Audit Log Manipulation"}]}],"affected":[{"vendor":"HashiCorp","product":"Vault","platforms":["Windows","MacOS","Linux","x86","ARM","64 bit","32 bit"],"repo":"https://github.com/hashicorp/vault","versions":[{"status":"affected","version":"1.15.0","lessThanOrEqual":"1.15.4","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"HashiCorp","product":"Vault Enterprise","platforms":["Windows","MacOS","Linux","x86","ARM","64 bit","32 bit"],"versions":[{"status":"affected","version":"1.15.0","lessThanOrEqual":"1.15.4","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw`.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span style=\"background-color: transparent;\">Vault and Vault Enterprise (“Vault”) </span><span style=\"background-color: rgb(255, 255, 255);\">may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw`.</span></p><br><br>"}]}],"references":[{"url":"https://discuss.hashicorp.com/t/hcsec-2024-01-vault-may-expose-sensitive-information-when-configuring-an-audit-log-device/62311"},{"url":"https://developer.hashicorp.com/vault/docs/upgrading/upgrade-to-1.15.x#audit-devices-could-log-raw-data-despite-configuration"},{"url":"https://security.netapp.com/advisory/ntap-20240223-0005/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":4.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}}],"source":{"discovery":"INTERNAL"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-0831","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-02-01T14:27:53.989443Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T17:22:51.524Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:18:18.883Z"},"title":"CVE Program Container","references":[{"url":"https://discuss.hashicorp.com/t/hcsec-2024-01-vault-may-expose-sensitive-information-when-configuring-an-audit-log-device/62311","tags":["x_transferred"]},{"url":"https://developer.hashicorp.com/vault/docs/upgrading/upgrade-to-1.15.x#audit-devices-could-log-raw-data-despite-configuration","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240223-0005/","tags":["x_transferred"]}]}]}}