CVE-2021-32575
Description
HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Nomad bridge networking mode up to 1.0.4 allows ARP spoofing attacks from other bridged tasks on the same node due to default CAP_NET_RAW capability.
Vulnerability
HashiCorp Nomad and Nomad Enterprise up to version 1.0.4, specifically when using bridge networking mode with the docker, exec, or java task drivers on Linux, is vulnerable to ARP spoofing attacks. The vulnerability arises because these task drivers enable the CAP_NET_RAW Linux capability by default, allowing tasks within the same bridge network namespace to send arbitrary ARP packets. Affected versions include all Nomad releases up to and including 1.0.4, with fixes available in versions 0.12.12, 1.0.5, and 1.1.0 Release Candidate 1 [1][2].
Exploitation
An attacker must be able to run a task on a Nomad client node that uses bridge networking mode with the docker, exec, or java task drivers. The attacker does not require any special privileges beyond the ability to execute code within their task. Exploitation involves crafting ARP packets from the attacker's task to poison the ARP cache of other bridged tasks on the same node. This is possible because the CAP_NET_RAW capability permits raw socket access, which the attacker can use to send spoofed ARP replies [2].
Impact
A successful ARP spoofing attack allows the attacker to intercept, modify, or block network traffic intended for other tasks within the same bridge network on the same Nomad client node. This can lead to denial of service (DoS) and man-in-the-middle (MITM) attacks, potentially compromising the confidentiality and integrity of data exchanged between affected tasks [2].
Mitigation
The vulnerability is fixed in Nomad versions 0.12.12, 1.0.5, and 1.1.0 RC1. The fix disables the CAP_NET_RAW capability by default for the docker, exec, and java task drivers. For the docker task driver, previous behavior can be restored using the allow_caps plugin configuration option. Similar configurability for exec and java task drivers is planned for a future release. Users are advised to upgrade to a fixed version as soon as possible [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/hashicorp/nomadGo | >= 1.0.0, < 1.0.5 | 1.0.5 |
github.com/hashicorp/nomadGo | < 0.12.12 | 0.12.12 |
Affected products
2- HashiCorp/Nomaddescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-vf6q-9f2f-mwhvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-32575ghsaADVISORY
- discuss.hashicorp.com/t/hcsec-2021-14-nomad-bridge-networking-mode-allows-arp-spoofing-from-other-bridged-tasks-on-same-node/24296ghsax_refsource_MISCWEB
- www.hashicorp.com/blog/category/nomadghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.