CVE-2021-32574
Description
HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy proxy TLS configuration does not validate destination service identity in the encoded subject alternative name. Fixed in 1.8.14, 1.9.8, and 1.10.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Consul's Envoy proxy TLS config does not validate destination service SAN, allowing service impersonation in versions 1.3.0–1.10.0.
Vulnerability
HashiCorp Consul and Consul Enterprise versions 1.3.0 through 1.10.0 contain a vulnerability in the Envoy proxy TLS configuration for Consul Connect. The configuration does not validate the destination service identity encoded in the X.509 Subject Alternative Name (SAN) of the SPIFFE certificate. This affects all deployments using Consul Connect with Envoy proxies, where service-to-service communication relies on mutual TLS and intentions. The issue is fixed in versions 1.8.14, 1.9.8, and 1.10.1 [1], [2], [3].
Exploitation
An attacker with network access to a Consul Connect service mesh can potentially impersonate a legitimate destination service. The attacker must control a service that has a valid certificate issued by the Consul CA. Because the Envoy proxy only verifies that the certificate is signed by a trusted CA and does not check the destination identity in the SAN, a malicious service can present its own valid certificate and be incorrectly trusted as the intended upstream service. No additional authentication or user interaction is required beyond being part of the mesh [3].
Impact
Successful exploitation allows a malicious service to masquerade as another service within the Consul Connect mesh. This can lead to unauthorized access to sensitive data or functions intended for the impersonated service, violating the intended security policy enforced by Consul intentions. The confidentiality and integrity of service-to-service communication can be compromised, potentially enabling lateral movement or data exfiltration [1], [3].
Mitigation
Upgrade Consul or Consul Enterprise to version 1.8.14, 1.9.8, 1.10.1, or later. These versions include the fix that enables mutual verification of destination service identity via the encoded SAN in the Envoy proxy TLS configuration [1], [2], [3]. Gentoo users should upgrade to consul >=1.9.17 [4]. No workaround is available for unpatched versions.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/hashicorp/consulGo | < 1.10.1 | 1.10.1 |
Affected products
27- HashiCorp/Consuldescription
- osv-coords26 versionspkg:apk/chainguard/consul-1.15pkg:apk/chainguard/consul-1.15-oci-entrypointpkg:apk/chainguard/consul-1.15-oci-entrypoint-compatpkg:apk/chainguard/consul-1.16pkg:apk/chainguard/consul-1.16-oci-entrypointpkg:apk/chainguard/consul-1.16-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17pkg:apk/chainguard/consul-1.17-fipspkg:apk/chainguard/consul-1.17-fips-oci-entrypointpkg:apk/chainguard/consul-1.17-fips-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17-oci-entrypointpkg:apk/chainguard/consul-1.17-oci-entrypoint-compatpkg:apk/chainguard/k3dpkg:apk/chainguard/k3d-proxypkg:apk/chainguard/k3d-toolspkg:apk/wolfi/consul-1.15pkg:apk/wolfi/consul-1.15-oci-entrypointpkg:apk/wolfi/consul-1.15-oci-entrypoint-compatpkg:apk/wolfi/consul-1.16pkg:apk/wolfi/consul-1.16-oci-entrypointpkg:apk/wolfi/consul-1.16-oci-entrypoint-compatpkg:apk/wolfi/k3dpkg:apk/wolfi/k3d-proxypkg:apk/wolfi/k3d-toolspkg:bitnami/consulpkg:golang/github.com/hashicorp/consul
< 1.15.11-r5+ 25 more
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: >= 1.3.0, < 1.8.14
- (no CPE)range: < 1.10.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-25gf-8qrr-g78rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-32574ghsaADVISORY
- security.gentoo.org/glsa/202208-09ghsavendor-advisoryx_refsource_GENTOOWEB
- discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856ghsax_refsource_CONFIRMWEB
- github.com/hashicorp/consul/releases/tag/v1.10.1ghsax_refsource_CONFIRMWEB
- www.hashicorp.com/blog/category/consulghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.