Vulnerabilities
Vulnerable Software
Hashicorp:  >> Boundary  >> 0.12.0  Security Vulnerabilities
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
CVSS Score
8.0
EPSS Score
0.003
Published
2024-02-05


Contact Us

Shodan ® - All rights reserved