Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-e8wd-mxwb-rqdj
Summary
Missing Authorization in HashiCorp Consul
HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0.
Aliases
0
alias CVE-2022-3920
1
alias GHSA-gw2g-hhc9-wgjh
Fixed_packages
0
url pkg:apk/alpine/consul@1.14.1-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=armhf&distroversion=v3.18&reponame=community
1
url pkg:apk/alpine/consul@1.14.1-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=armv7&distroversion=v3.18&reponame=community
2
url pkg:apk/alpine/consul@1.14.1-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
3
url pkg:apk/alpine/consul@1.14.1-r0?arch=armhf&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=armhf&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=armhf&distroversion=v3.17&reponame=community
4
url pkg:apk/alpine/consul@1.14.1-r0?arch=ppc64le&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=ppc64le&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=ppc64le&distroversion=v3.17&reponame=community
5
url pkg:apk/alpine/consul@1.14.1-r0?arch=s390x&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=s390x&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=s390x&distroversion=v3.17&reponame=community
6
url pkg:apk/alpine/consul@1.14.1-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=x86&distroversion=v3.17&reponame=community
7
url pkg:apk/alpine/consul@1.14.1-r0?arch=x86_64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=x86_64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=x86_64&distroversion=v3.17&reponame=community
8
url pkg:apk/alpine/consul@1.14.1-r0?arch=aarch64&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=aarch64&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=aarch64&distroversion=v3.18&reponame=community
9
url pkg:apk/alpine/consul@1.14.1-r0?arch=ppc64le&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=ppc64le&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=ppc64le&distroversion=v3.18&reponame=community
10
url pkg:apk/alpine/consul@1.14.1-r0?arch=s390x&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=s390x&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=s390x&distroversion=v3.18&reponame=community
11
url pkg:apk/alpine/consul@1.14.1-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=x86&distroversion=v3.18&reponame=community
12
url pkg:apk/alpine/consul@1.14.1-r0?arch=x86_64&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=x86_64&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=x86_64&distroversion=v3.18&reponame=community
13
url pkg:apk/alpine/consul@1.14.1-r0?arch=armv7&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/consul@1.14.1-r0?arch=armv7&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/consul@1.14.1-r0%3Farch=armv7&distroversion=v3.17&reponame=community
14
url pkg:deb/debian/consul@0?distro=bullseye
purl pkg:deb/debian/consul@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/consul@0%3Fdistro=bullseye
15
url pkg:deb/debian/consul@1.8.7%2Bdfsg1-2?distro=bullseye
purl pkg:deb/debian/consul@1.8.7%2Bdfsg1-2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/consul@1.8.7%252Bdfsg1-2%3Fdistro=bullseye
16
url pkg:golang/github.com/hashicorp/consul@1.14.0
purl pkg:golang/github.com/hashicorp/consul@1.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/hashicorp/consul@1.14.0
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3920.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3920
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.6229
published_at 2026-04-21T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62199
published_at 2026-04-07T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62249
published_at 2026-04-08T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62267
published_at 2026-04-09T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62285
published_at 2026-04-11T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62274
published_at 2026-04-12T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62253
published_at 2026-04-13T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62298
published_at 2026-04-16T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62305
published_at 2026-04-18T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62202
published_at 2026-04-02T12:55:00Z
10
value 0.00426
scoring_system epss
scoring_elements 0.62233
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3920
2
reference_url https://discuss.hashicorp.com/t/hcsec-2022-28-consul-cluster-peering-leaks-imported-nodes-services-information/46946
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T20:01:41Z/
url https://discuss.hashicorp.com/t/hcsec-2022-28-consul-cluster-peering-leaks-imported-nodes-services-information/46946
3
reference_url https://github.com/hashicorp/consul/commit/706866fa0016b0aa302679f9c648859050d19b2e
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/hashicorp/consul/commit/706866fa0016b0aa302679f9c648859050d19b2e
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-3920
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-3920
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148169
reference_id 2148169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148169
Weaknesses
0
cwe_id 862
name Missing Authorization
description The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Exploits
Severity_range_score5.3 - 8.9
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-e8wd-mxwb-rqdj