Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ysg6-921d-d7fe
Vulnerability ID VCID-ysg6-921d-d7fe
Aliases CVE-2022-24687
GHSA-hj93-5fg3-3chr
Summary Multiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service.
Status Published
Exploitability None
Weighted Severity None
Risk None
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2022-24687
cvssv3.1 6.5 https://discuss.hashicorp.com
generic_textual MODERATE https://discuss.hashicorp.com
cvssv3.1 6.5 https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers
generic_textual MODERATE https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers
cvssv3.1 6.5 https://github.com/hashicorp/consul
generic_textual MODERATE https://github.com/hashicorp/consul
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2022-24687
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2022-24687
cvssv3.1 6.5 https://security.gentoo.org/glsa/202208-09
generic_textual MODERATE https://security.gentoo.org/glsa/202208-09
cvssv3.1 6.5 https://security.netapp.com/advisory/ntap-20220331-0006
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20220331-0006
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://discuss.hashicorp.com
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/hashicorp/consul
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-24687
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202208-09
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://security.netapp.com/advisory/ntap-20220331-0006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.70436
EPSS Score 0.00638
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:04:42.211269+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/202208-09 38.0.0