CVE-2026-3605

| EUVD-2026-23346 HIGH
2026-04-17 HashiCorp GHSA-m2w4-8ggf-rj47
8.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Updated
Apr 17, 2026 - 04:28 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 17, 2026 - 04:22 vuln.today
cvss_changed
patch_available
Apr 17, 2026 - 04:01 EUVD
Analysis Generated
Apr 17, 2026 - 03:34 vuln.today

DescriptionNVD

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fxed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

AnalysisAI

HashiCorp Vault's KVv2 secrets engine allows authenticated users with glob-based policy access to delete secrets outside their authorization scope, causing denial-of-service across versions 0.10.0 through 1.x. The flaw stems from improper access control (CWE-288) in policy glob evaluation during delete operations. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all HashiCorp Vault instances and confirm KVv2 secret engine usage and glob-based policy configurations. Within 7 days: Apply vendor-released patch to all affected Vault versions (0.10.0 through latest 1.x prior to patched release-consult HashiCorp advisory for exact patched version numbers). …

Sign in for detailed remediation steps.

Share

CVE-2026-3605 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy