{"id":"CVE-2022-40716","details":"HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2.\"","aliases":["BIT-consul-2022-40716","GHSA-m69r-9g56-7mv8","GO-2022-1029"],"modified":"2026-03-20T12:16:49.252265Z","published":"2022-09-23T12:15:10.500Z","related":["CGA-2f56-mhq5-ggwp"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/"},{"type":"ADVISORY","url":"https://discuss.hashicorp.com"},{"type":"ADVISORY","url":"https://discuss.hashicorp.com/t/hcsec-2022-20-consul-service-mesh-intention-bypass-with-malicious-certificate-signing-request/44628"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hashicorp/consul","events":[{"introduced":"0"},{"fixed":"716c835ecea933fa207c96d7f7363422c73069c8"},{"introduced":"0"},{"fixed":"716c835ecea933fa207c96d7f7363422c73069c8"},{"introduced":"09a8cdb4a5c0c53201d7888d9fb618dde007cdd8"},{"fixed":"778b5eaa98c8e68d5f9cacdaa0f8e472fff4d3d3"},{"introduced":"09a8cdb4a5c0c53201d7888d9fb618dde007cdd8"},{"fixed":"778b5eaa98c8e68d5f9cacdaa0f8e472fff4d3d3"},{"introduced":"8c2372092a8683dd40221372597d3efed0c84e2b"},{"fixed":"0e046bbb34f12b4a38c6c2dc6497426761f0b02f"},{"introduced":"8c2372092a8683dd40221372597d3efed0c84e2b"},{"fixed":"0e046bbb34f12b4a38c6c2dc6497426761f0b02f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.11.9"},{"introduced":"0"},{"fixed":"1.11.9"},{"introduced":"1.12.0"},{"fixed":"1.12.5"},{"introduced":"1.12.0"},{"fixed":"1.12.5"},{"introduced":"1.13.0"},{"fixed":"1.13.2"},{"introduced":"1.13.0"},{"fixed":"1.13.2"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40716.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}