Nomad ACL Policies without Label are Applied to Unexpected Resources
Description
HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
HashiCorp Nomad ACL policies using a block without a label may be applied to unintended resources, leading to potential privilege escalation.
Vulnerability
Overview
A vulnerability in HashiCorp Nomad and Nomad Enterprise, tracked as CVE-2023-3072, affects versions 0.7.0 through 1.5.6 and 1.4.10. The issue occurs when ACL policies defined in HCL syntax use a block that expects a label but does not specify one. In such cases, the policy may be applied to unexpected resources, bypassing the intended access controls [1][3].
Exploitation and
Attack Surface
Exploitation requires that an administrator creates or updates an ACL policy without a label on a block that requires labeling. For example, a namespace block without a label could be erroneously applied to a resource named "policy" instead of a specific namespace [3]. An attacker with sufficient privileges to modify ACL policies, or who can influence policy creation, could exploit this misconfiguration to gain unintended access. The attack surface is local to the Nomad cluster's ACL system; no network-level exploitation is described [3].
Impact
If successfully exploited, an attacker may gain access to resources or operations that were not intended, potentially leading to privilege escalation or unauthorized access to sensitive data and jobs within the Nomad cluster [3]. The severity is highlighted by the fact that Nomad's ACL system is central to authorization for the HTTP API [2][3].
Mitigation
HashiCorp has fixed the issue in Nomad 1.6.0, 1.5.7, and 1.4.11. Users are advised to upgrade to these or later versions. No workarounds are documented; however, reviewing existing ACL policies to ensure that all blocks have labels where expected can help mitigate risks temporarily [1][3].
- NVD - CVE-2023-3072
- GitHub - hashicorp/nomad: Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. Nomad is easy to operate and scale and has native Consul and Vault integrations.
- HCSEC-2023-20 - Nomad ACL Policies without Label are Applied to Unexpected Resources
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/hashicorp/nomadGo | >= 0.7.0, < 1.4.11 | 1.4.11 |
github.com/hashicorp/nomadGo | >= 1.5.0, < 1.5.6 | 1.5.6 |
Affected products
3- HashiCorp/Nomadv5Range: 0.7.0
- HashiCorp/Nomad Enterprisev5Range: 0.7.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.