Consul Cluster Peering can Result in Denial of Service
Description
Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Consul cluster peering allows a peer with a same-named service to corrupt state and cause denial of service, fixed in versions 1.14.7 and 1.15.3.
Vulnerability
Overview
CVE-2023-1297 is a denial-of-service vulnerability in HashiCorp Consul's cluster peering feature. The flaw occurs when a peer cluster has a service with the same name as a local service; under these conditions, deleting the service on the peer cluster can corrupt Consul's internal state, leading to a denial of service [1][3]. The issue is rooted in how Consul handles imported service registrations that conflict with locally defined service names.
Exploitation
Scenario
The vulnerability can be triggered by an attacker who controls a peer cluster in a Consul cluster peering relationship. By registering a service with the same name as a local service on the target cluster and then deleting it, the attacker can corrupt the target's state [3]. No authentication or special privileges beyond establishing a peering connection are required, though the feature is typically used in trusted environments. The attack does not require network access to the target's internal services, only the ability to peer with the cluster.
Impact
Successful exploitation results in denial of service: the corrupted state prevents Consul from operating correctly, potentially disrupting service discovery, health checks, and other critical functions [1][3]. The vulnerability does not allow data exfiltration or privilege escalation; its primary impact is on availability.
Mitigation
HashiCorp has fixed the issue in Consul versions 1.14.7 and 1.15.3 [3]. All earlier versions that support cluster peering (1.13.x through 1.14.0, and 1.15.0) are affected. Cluster peering was beta in 1.13.x and not patched there, so users on 1.13.x should upgrade to a supported fixed branch. No workarounds are documented; upgrading is the recommended remediation [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/hashicorp/consulGo | < 1.14.5 | 1.14.5 |
github.com/hashicorp/consulGo | >= 1.15.0, < 1.15.3 | 1.15.3 |
Affected products
28- osv-coords26 versionspkg:apk/chainguard/consul-1.15pkg:apk/chainguard/consul-1.15-oci-entrypointpkg:apk/chainguard/consul-1.15-oci-entrypoint-compatpkg:apk/chainguard/consul-1.16pkg:apk/chainguard/consul-1.16-oci-entrypointpkg:apk/chainguard/consul-1.16-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17pkg:apk/chainguard/consul-1.17-fipspkg:apk/chainguard/consul-1.17-fips-oci-entrypointpkg:apk/chainguard/consul-1.17-fips-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17-oci-entrypointpkg:apk/chainguard/consul-1.17-oci-entrypoint-compatpkg:apk/chainguard/k3dpkg:apk/chainguard/k3d-proxypkg:apk/chainguard/k3d-toolspkg:apk/wolfi/consul-1.15pkg:apk/wolfi/consul-1.15-oci-entrypointpkg:apk/wolfi/consul-1.15-oci-entrypoint-compatpkg:apk/wolfi/consul-1.16pkg:apk/wolfi/consul-1.16-oci-entrypointpkg:apk/wolfi/consul-1.16-oci-entrypoint-compatpkg:apk/wolfi/k3dpkg:apk/wolfi/k3d-proxypkg:apk/wolfi/k3d-toolspkg:bitnami/consulpkg:golang/github.com/hashicorp/consul
< 0+ 25 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: >= 1.13.0, < 1.14.7
- (no CPE)range: < 1.14.5
- HashiCorp/Consulv5Range: 1.14.0
- HashiCorp/Consul Enterprisev5Range: 1.14.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.