Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-rk2n-tuu9-fbdc
Summary
HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0
HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0.
Aliases
0
alias CVE-2021-38553
1
alias GHSA-23fq-q7hc-993r
Fixed_packages
0
url pkg:alpm/archlinux/vault@1.9.0-1
purl pkg:alpm/archlinux/vault@1.9.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vault@1.9.0-1
1
url pkg:ebuild/app-admin/vault@1.10.3
purl pkg:ebuild/app-admin/vault@1.10.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/vault@1.10.3
2
url pkg:golang/github.com/hashicorp/vault@1.8.0
purl pkg:golang/github.com/hashicorp/vault@1.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/hashicorp/vault@1.8.0
Affected_packages
0
url pkg:alpm/archlinux/vault@1.7.3-1
purl pkg:alpm/archlinux/vault@1.7.3-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4795-vxdy-w7g3
1
vulnerability VCID-bfm3-2zvj-5bca
2
vulnerability VCID-rk2n-tuu9-fbdc
3
vulnerability VCID-xerz-1x1v-uuap
4
vulnerability VCID-xk9c-q66v-3kcx
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vault@1.7.3-1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38553.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38553
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09252
published_at 2026-04-18T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09254
published_at 2026-04-16T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09361
published_at 2026-04-13T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09344
published_at 2026-04-08T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09355
published_at 2026-04-04T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09268
published_at 2026-04-07T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09393
published_at 2026-04-09T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09376
published_at 2026-04-12T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09304
published_at 2026-04-01T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09405
published_at 2026-04-21T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09305
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38553
2
reference_url https://discuss.hashicorp.com/t/hcsec-2021-20-vault-s-integrated-storage-backend-database-file-may-have-excessively-broad-permissions/28168
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://discuss.hashicorp.com/t/hcsec-2021-20-vault-s-integrated-storage-backend-database-file-may-have-excessively-broad-permissions/28168
3
reference_url https://github.com/hashicorp/vault
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/hashicorp/vault
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-38553
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-38553
5
reference_url https://security.gentoo.org/glsa/202207-01
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202207-01
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1995209
reference_id 1995209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1995209
7
reference_url https://security.archlinux.org/AVG-2294
reference_id AVG-2294
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2294
Weaknesses
0
cwe_id 281
name Improper Preservation of Permissions
description The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
1
cwe_id 276
name Incorrect Default Permissions
description During installation, installed file permissions are set to allow anyone to modify those files.
Exploits
Severity_range_score4.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-rk2n-tuu9-fbdc