Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3867: CWE-613 Insufficient Session Expiration in HashiCorp Nomad

0
Low
VulnerabilityCVE-2022-3867cvecve-2022-3867cwe-613
Published: Thu Nov 10 2022 (11/10/2022, 05:45:53 UTC)
Source: CVE
Vendor/Project: HashiCorp
Product: Nomad

Description

HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2.

AI-Powered Analysis

AILast updated: 06/25/2025, 22:31:17 UTC

Technical Analysis

CVE-2022-3867 is a vulnerability identified in HashiCorp Nomad versions 1.4.0 and 1.4.1, specifically related to insufficient session expiration (CWE-613). Nomad is a widely used workload orchestrator designed to deploy and manage containerized and non-containerized applications across distributed infrastructure. The vulnerability affects the event stream subscriber mechanism, where subscribers use tokens with a time-to-live (TTL) to receive real-time updates. Due to improper session expiration handling, tokens continue to receive event stream updates until the token garbage collection process occurs, which may be delayed or inconsistent. This behavior means that even after a token should have expired, it remains valid for event streaming, potentially allowing prolonged access to event data. The issue was addressed and fixed in Nomad version 1.4.2. The CVSS 3.1 base score for this vulnerability is 2.7, indicating a low severity level. The vector string (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) shows that the vulnerability can be exploited remotely over the network, requires high privileges, no user interaction, and impacts confidentiality slightly without affecting integrity or availability. No known exploits have been reported in the wild. The vulnerability does not allow privilege escalation or direct system compromise but could lead to unauthorized access to event stream data beyond intended session lifetimes, potentially leaking sensitive operational information.

Potential Impact

For European organizations using HashiCorp Nomad versions 1.4.0 or 1.4.1, this vulnerability could result in extended unauthorized access to event stream data. While the impact on confidentiality is low, the exposure of operational event data could aid attackers in reconnaissance or lateral movement within the infrastructure. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is inadvertently exposed. However, since exploitation requires high privileges, the threat is primarily to internal users or attackers who have already gained elevated access. The availability and integrity of systems are not affected, reducing the risk of service disruption or data manipulation. Overall, the impact is limited but should not be ignored in environments where session management and data confidentiality are critical.

Mitigation Recommendations

European organizations should upgrade HashiCorp Nomad to version 1.4.2 or later to ensure the vulnerability is patched. Beyond patching, organizations should implement strict access controls and monitoring around Nomad event stream tokens, including limiting token issuance to necessary users and services only. Regularly auditing token lifetimes and garbage collection processes can help detect anomalies in session expiration. Employ network segmentation to restrict access to Nomad event streams to trusted hosts and users. Additionally, integrating Nomad logs and event streams into centralized security information and event management (SIEM) systems can facilitate early detection of abnormal token usage patterns. For environments where immediate patching is not feasible, consider temporarily disabling event stream subscriptions or enforcing shorter TTLs through configuration if supported. Finally, ensure that privileged accounts are secured with multi-factor authentication and monitored for unusual activity to reduce the risk of token misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
HashiCorp
Date Reserved
2022-11-04T22:54:20.822Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec5a4

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 10:31:17 PM

Last updated: 2/7/2026, 8:59:24 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats