VYPR
High severityNVD Advisory· Published Jul 17, 2021· Updated Aug 3, 2024

CVE-2021-32574

CVE-2021-32574

Description

HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy proxy TLS configuration does not validate destination service identity in the encoded subject alternative name. Fixed in 1.8.14, 1.9.8, and 1.10.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Consul's Envoy proxy TLS config does not validate destination service SAN, allowing service impersonation in versions 1.3.0–1.10.0.

Vulnerability

HashiCorp Consul and Consul Enterprise versions 1.3.0 through 1.10.0 contain a vulnerability in the Envoy proxy TLS configuration for Consul Connect. The configuration does not validate the destination service identity encoded in the X.509 Subject Alternative Name (SAN) of the SPIFFE certificate. This affects all deployments using Consul Connect with Envoy proxies, where service-to-service communication relies on mutual TLS and intentions. The issue is fixed in versions 1.8.14, 1.9.8, and 1.10.1 [1], [2], [3].

Exploitation

An attacker with network access to a Consul Connect service mesh can potentially impersonate a legitimate destination service. The attacker must control a service that has a valid certificate issued by the Consul CA. Because the Envoy proxy only verifies that the certificate is signed by a trusted CA and does not check the destination identity in the SAN, a malicious service can present its own valid certificate and be incorrectly trusted as the intended upstream service. No additional authentication or user interaction is required beyond being part of the mesh [3].

Impact

Successful exploitation allows a malicious service to masquerade as another service within the Consul Connect mesh. This can lead to unauthorized access to sensitive data or functions intended for the impersonated service, violating the intended security policy enforced by Consul intentions. The confidentiality and integrity of service-to-service communication can be compromised, potentially enabling lateral movement or data exfiltration [1], [3].

Mitigation

Upgrade Consul or Consul Enterprise to version 1.8.14, 1.9.8, 1.10.1, or later. These versions include the fix that enables mutual verification of destination service identity via the encoded SAN in the Envoy proxy TLS configuration [1], [2], [3]. Gentoo users should upgrade to consul >=1.9.17 [4]. No workaround is available for unpatched versions.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/hashicorp/consulGo
< 1.10.11.10.1

Affected products

27

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.