CVE-2022-3866: CWE-668 Exposure of Resource to Wrong Sphere in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under nomad/ that belong to other jobs in the same namespace. Fixed in 1.4.2.
AI Analysis
Technical Summary
CVE-2022-3866 is a medium-severity vulnerability affecting HashiCorp Nomad and Nomad Enterprise versions 1.4.0 and 1.4.1. The issue arises from improper access control in the workload identity token functionality, which allows a token to list non-sensitive metadata for paths under the 'nomad/' namespace that belong to other jobs within the same namespace. This vulnerability is classified under CWE-668, indicating an exposure of resources to an incorrect sphere, meaning that information intended to be isolated per job is inadvertently accessible across jobs sharing the same namespace. The vulnerability does not expose sensitive data but allows enumeration of metadata that could aid an attacker in reconnaissance or lateral movement within the environment. The flaw was fixed in version 1.4.2. The CVSS v3.1 base score is 5.0 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and scope changed (S:C). The impact is limited to confidentiality (partial information disclosure), with no impact on integrity or availability. Exploitation requires a workload identity token with some privileges, but no user interaction is needed. No known exploits are currently reported in the wild. This vulnerability primarily affects environments using Nomad for workload orchestration where multiple jobs share namespaces and workload identity tokens are in use.
Potential Impact
For European organizations leveraging HashiCorp Nomad for workload orchestration, this vulnerability could lead to unauthorized disclosure of non-sensitive metadata across jobs within the same namespace. While the data exposed is not sensitive, it could provide attackers or malicious insiders with valuable information about other jobs, potentially aiding in further attacks such as privilege escalation or lateral movement. Organizations in sectors with strict data privacy and compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk if attackers use this metadata exposure to map internal workloads or infer operational details. The impact is more pronounced in multi-tenant or shared environments where job isolation is critical. Since the vulnerability requires a workload identity token with some privileges, insider threats or compromised tokens pose a higher risk. However, the lack of impact on integrity and availability reduces the likelihood of direct service disruption. Overall, the vulnerability represents a moderate confidentiality risk that could facilitate more sophisticated attacks if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Upgrade affected HashiCorp Nomad installations to version 1.4.2 or later, where the vulnerability is patched. 2. Audit and restrict workload identity token permissions to the minimum necessary scope, avoiding overly permissive tokens that could access multiple jobs' metadata. 3. Implement strict namespace segmentation and consider using separate namespaces for sensitive or critical workloads to reduce cross-job exposure. 4. Monitor and log access to workload identity tokens and metadata endpoints to detect unusual or unauthorized enumeration activities. 5. Employ network segmentation and zero-trust principles to limit token misuse and lateral movement within the environment. 6. Conduct regular security reviews of Nomad configurations and access controls, focusing on token issuance and namespace policies. 7. Educate DevOps and security teams about the risks of metadata exposure and the importance of token hygiene. These steps go beyond generic patching by emphasizing operational controls and monitoring to reduce the attack surface and detect potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Belgium, Italy
CVE-2022-3866: CWE-668 Exposure of Resource to Wrong Sphere in HashiCorp Nomad
Description
HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under nomad/ that belong to other jobs in the same namespace. Fixed in 1.4.2.
AI-Powered Analysis
Technical Analysis
CVE-2022-3866 is a medium-severity vulnerability affecting HashiCorp Nomad and Nomad Enterprise versions 1.4.0 and 1.4.1. The issue arises from improper access control in the workload identity token functionality, which allows a token to list non-sensitive metadata for paths under the 'nomad/' namespace that belong to other jobs within the same namespace. This vulnerability is classified under CWE-668, indicating an exposure of resources to an incorrect sphere, meaning that information intended to be isolated per job is inadvertently accessible across jobs sharing the same namespace. The vulnerability does not expose sensitive data but allows enumeration of metadata that could aid an attacker in reconnaissance or lateral movement within the environment. The flaw was fixed in version 1.4.2. The CVSS v3.1 base score is 5.0 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and scope changed (S:C). The impact is limited to confidentiality (partial information disclosure), with no impact on integrity or availability. Exploitation requires a workload identity token with some privileges, but no user interaction is needed. No known exploits are currently reported in the wild. This vulnerability primarily affects environments using Nomad for workload orchestration where multiple jobs share namespaces and workload identity tokens are in use.
Potential Impact
For European organizations leveraging HashiCorp Nomad for workload orchestration, this vulnerability could lead to unauthorized disclosure of non-sensitive metadata across jobs within the same namespace. While the data exposed is not sensitive, it could provide attackers or malicious insiders with valuable information about other jobs, potentially aiding in further attacks such as privilege escalation or lateral movement. Organizations in sectors with strict data privacy and compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk if attackers use this metadata exposure to map internal workloads or infer operational details. The impact is more pronounced in multi-tenant or shared environments where job isolation is critical. Since the vulnerability requires a workload identity token with some privileges, insider threats or compromised tokens pose a higher risk. However, the lack of impact on integrity and availability reduces the likelihood of direct service disruption. Overall, the vulnerability represents a moderate confidentiality risk that could facilitate more sophisticated attacks if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Upgrade affected HashiCorp Nomad installations to version 1.4.2 or later, where the vulnerability is patched. 2. Audit and restrict workload identity token permissions to the minimum necessary scope, avoiding overly permissive tokens that could access multiple jobs' metadata. 3. Implement strict namespace segmentation and consider using separate namespaces for sensitive or critical workloads to reduce cross-job exposure. 4. Monitor and log access to workload identity tokens and metadata endpoints to detect unusual or unauthorized enumeration activities. 5. Employ network segmentation and zero-trust principles to limit token misuse and lateral movement within the environment. 6. Conduct regular security reviews of Nomad configurations and access controls, focusing on token issuance and namespace policies. 7. Educate DevOps and security teams about the risks of metadata exposure and the importance of token hygiene. These steps go beyond generic patching by emphasizing operational controls and monitoring to reduce the attack surface and detect potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- HashiCorp
- Date Reserved
- 2022-11-04T22:54:15.589Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec595
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 6/25/2025, 10:41:37 PM
Last updated: 8/15/2025, 4:31:42 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.