CVE-2025-11374: CWE-770: Allocation of Resources Without Limits or Throttling in HashiCorp Consul
Consul and Consul Enterprise’s (“Consul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
AI Analysis
Technical Summary
CVE-2025-11374 is a vulnerability classified under CWE-770, indicating allocation of resources without limits or throttling, found in HashiCorp Consul's key/value endpoint. The root cause is improper validation of the HTTP Content-Length header, which allows an attacker to send requests that cause the server to allocate excessive resources. This can lead to denial of service by exhausting memory or processing capacity, thereby disrupting the availability of Consul services. Consul is widely used for service discovery, configuration, and orchestration in cloud-native environments. The vulnerability requires network access and low privileges (PR:L) but does not require user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates that the attack can be performed remotely over the network with low complexity, no user interaction, and results in high impact on availability only. The vulnerability affects all versions prior to Consul Community Edition 1.22.0 and corresponding enterprise versions 1.22.0, 1.21.6, 1.20.8, and 1.18.12 have been released to address this issue. No public exploits have been reported yet, but the nature of the flaw makes it a potential target for DoS attacks. The lack of throttling or resource limits in processing the Content-Length header is the core technical issue, allowing attackers to overwhelm the system.
Potential Impact
For European organizations, the primary impact of CVE-2025-11374 is on service availability. Consul is often a critical component in microservices architectures and cloud infrastructure management; disruption can cascade to dependent applications and services, causing operational downtime and potential business impact. While confidentiality and integrity are not directly affected, the unavailability of Consul services can hinder deployment pipelines, service discovery, and configuration management, leading to degraded performance or outages. Organizations with large-scale or complex cloud environments that rely heavily on Consul are at greater risk. Additionally, the medium complexity and remote exploitability mean that attackers could automate DoS attempts, potentially targeting high-value infrastructure. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
1. Upgrade Consul to Community Edition 1.22.0 or later, or the corresponding patched Enterprise versions (1.22.0, 1.21.6, 1.20.8, 1.18.12) as soon as possible to eliminate the vulnerability. 2. Implement network segmentation and restrict access to Consul's key/value endpoints to trusted hosts and networks only, using firewalls or access control lists. 3. Deploy rate limiting and request size validation at the network edge or via API gateways to detect and block abnormal Content-Length header values or excessive request sizes. 4. Monitor Consul logs and network traffic for unusual patterns indicative of resource exhaustion attempts, such as repeated large or malformed requests. 5. Consider deploying resource usage monitoring and alerting on Consul servers to detect early signs of DoS conditions. 6. Review and enforce secure configuration best practices for Consul, including authentication and authorization controls to limit exposure. 7. Prepare incident response plans to quickly isolate and mitigate DoS attacks targeting Consul infrastructure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
CVE-2025-11374: CWE-770: Allocation of Resources Without Limits or Throttling in HashiCorp Consul
Description
Consul and Consul Enterprise’s (“Consul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-11374 is a vulnerability classified under CWE-770, indicating allocation of resources without limits or throttling, found in HashiCorp Consul's key/value endpoint. The root cause is improper validation of the HTTP Content-Length header, which allows an attacker to send requests that cause the server to allocate excessive resources. This can lead to denial of service by exhausting memory or processing capacity, thereby disrupting the availability of Consul services. Consul is widely used for service discovery, configuration, and orchestration in cloud-native environments. The vulnerability requires network access and low privileges (PR:L) but does not require user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates that the attack can be performed remotely over the network with low complexity, no user interaction, and results in high impact on availability only. The vulnerability affects all versions prior to Consul Community Edition 1.22.0 and corresponding enterprise versions 1.22.0, 1.21.6, 1.20.8, and 1.18.12 have been released to address this issue. No public exploits have been reported yet, but the nature of the flaw makes it a potential target for DoS attacks. The lack of throttling or resource limits in processing the Content-Length header is the core technical issue, allowing attackers to overwhelm the system.
Potential Impact
For European organizations, the primary impact of CVE-2025-11374 is on service availability. Consul is often a critical component in microservices architectures and cloud infrastructure management; disruption can cascade to dependent applications and services, causing operational downtime and potential business impact. While confidentiality and integrity are not directly affected, the unavailability of Consul services can hinder deployment pipelines, service discovery, and configuration management, leading to degraded performance or outages. Organizations with large-scale or complex cloud environments that rely heavily on Consul are at greater risk. Additionally, the medium complexity and remote exploitability mean that attackers could automate DoS attempts, potentially targeting high-value infrastructure. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
1. Upgrade Consul to Community Edition 1.22.0 or later, or the corresponding patched Enterprise versions (1.22.0, 1.21.6, 1.20.8, 1.18.12) as soon as possible to eliminate the vulnerability. 2. Implement network segmentation and restrict access to Consul's key/value endpoints to trusted hosts and networks only, using firewalls or access control lists. 3. Deploy rate limiting and request size validation at the network edge or via API gateways to detect and block abnormal Content-Length header values or excessive request sizes. 4. Monitor Consul logs and network traffic for unusual patterns indicative of resource exhaustion attempts, such as repeated large or malformed requests. 5. Consider deploying resource usage monitoring and alerting on Consul servers to detect early signs of DoS conditions. 6. Review and enforce secure configuration best practices for Consul, including authentication and authorization controls to limit exposure. 7. Prepare incident response plans to quickly isolate and mitigate DoS attacks targeting Consul infrastructure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- HashiCorp
- Date Reserved
- 2025-10-06T15:34:09.965Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6901290f69001fc67a5e1760
Added to database: 10/28/2025, 8:35:27 PM
Last enriched: 12/9/2025, 4:07:50 AM
Last updated: 12/10/2025, 6:02:02 AM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13339: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in hippooo Hippoo Mobile App for WooCommerce
HighCVE-2025-67613
UnknownCVE-2025-67612
UnknownCVE-2025-67611
UnknownCVE-2025-67610
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.