VYPR
High severityNVD Advisory· Published Aug 9, 2023· Updated Oct 8, 2024

JWT Auth in L7 Intentions Allow For Mismatched Service Identity and JWT Providers for Access

CVE-2023-3518

Description

HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2023-3518: HashiCorp Consul 1.16.0 JWT Auth for service mesh incorrectly allows or denies access regardless of service identities, fixed in 1.16.1.

Vulnerability

CVE-2023-3518 is a vulnerability in HashiCorp Consul and Consul Enterprise 1.16.0 where JWT authentication for service mesh layer 7 intentions incorrectly allows or denies access regardless of the service identity (mTLS certificate). The issue was found during internal testing by the Consul engineering team [3].

Exploitation

The attack surface is specific to Consul deployments that use JWT authentication in the service mesh. An attacker who can craft requests to the mesh may exploit the misconfiguration: when two source intentions that restrict access with different JWT providers are configured, only one JWT validation configuration is used. This can allow some service identities to be incorrectly authenticated with mismatching JWTs [2][3].

Impact

Successful exploitation could allow an attacker to bypass intended access controls. Depending on the network configuration, this could result in unauthorized access to services within the mesh, potentially exposing sensitive data or allowing further network traversal. The vulnerability does not require special privileges beyond the ability to interact with the affected service mesh endpoints [3].

Mitigation

HashiCorp released Consul 1.16.1, which fixes the issue. Users of Consul 1.16.0 are advised to upgrade to 1.16.1 or later. No workarounds are mentioned in the advisory. The vulnerability was internally discovered and reported by HashiCorp's engineering team [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/hashicorp/consulGo
>= 1.16.0, < 1.16.11.16.1

Affected products

10

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.