{"id":"CVE-2022-40716","details":"HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2.\"","aliases":["BIT-consul-2022-40716","GHSA-m69r-9g56-7mv8","GO-2022-1029"],"modified":"2026-04-10T04:50:51.807070Z","published":"2022-09-23T12:15:10.500Z","related":["CGA-2f56-mhq5-ggwp"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/"},{"type":"ADVISORY","url":"https://discuss.hashicorp.com"},{"type":"ADVISORY","url":"https://discuss.hashicorp.com/t/hcsec-2022-20-consul-service-mesh-intention-bypass-with-malicious-certificate-signing-request/44628"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hashicorp/consul","events":[{"introduced":"0"},{"fixed":"716c835ecea933fa207c96d7f7363422c73069c8"},{"introduced":"0"},{"fixed":"716c835ecea933fa207c96d7f7363422c73069c8"},{"introduced":"09a8cdb4a5c0c53201d7888d9fb618dde007cdd8"},{"fixed":"778b5eaa98c8e68d5f9cacdaa0f8e472fff4d3d3"},{"introduced":"09a8cdb4a5c0c53201d7888d9fb618dde007cdd8"},{"fixed":"778b5eaa98c8e68d5f9cacdaa0f8e472fff4d3d3"},{"introduced":"8c2372092a8683dd40221372597d3efed0c84e2b"},{"fixed":"0e046bbb34f12b4a38c6c2dc6497426761f0b02f"},{"introduced":"8c2372092a8683dd40221372597d3efed0c84e2b"},{"fixed":"0e046bbb34f12b4a38c6c2dc6497426761f0b02f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.11.9"},{"introduced":"0"},{"fixed":"1.11.9"},{"introduced":"1.12.0"},{"fixed":"1.12.5"},{"introduced":"1.12.0"},{"fixed":"1.12.5"},{"introduced":"1.13.0"},{"fixed":"1.13.2"},{"introduced":"1.13.0"},{"fixed":"1.13.2"}]}}],"versions":["api/v1.0.0","api/v1.0.1","api/v1.1.0","api/v1.10.0","api/v1.12.0","api/v1.13.0","api/v1.15.2","api/v1.2.0","api/v1.4.0","internal/v0.1.0","sdk/v0.1.0","sdk/v0.1.1","sdk/v0.10.0","sdk/v0.2.0","sdk/v0.4.0","sdk/v0.9.0","v0.1.0","v0.2.0","v0.2.1","v0.3.0","v0.3.1","v0.4.0","v0.4.1","v0.5.0","v0.5.0rc1","v0.5.1","v0.5.2","v0.6.0","v0.6.0-rc1","v0.6.0-rc2","v0.6.1","v0.6.3","v0.6.4","v0.6.4-rc3","v0.7.0","v0.7.0-rc1","v0.7.0-rc2","v0.7.1","v0.7.2","v0.7.2-rc1","v0.7.3","v0.7.4","v0.8.0","v0.8.0-rc1","v0.8.1","v0.8.2","v0.8.4","v0.8.5","v0.9.0","v0.9.0-rc1","v0.9.1","v0.9.2","v0.9.3","v0.9.3-rc1","v0.9.3-rc2","v1.0.0","v1.0.0-beta1","v1.0.0-beta2","v1.0.1","v1.0.1-rc1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.1.0","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.4.0","v1.4.0-rc1","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.6.0","v1.6.1","v1.7.0","v1.7.0-beta1","v1.7.0-beta2","v1.7.0-beta3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-40716.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}