CVE-2025-11375: CWE-770: Allocation of Resources Without Limits or Throttling in HashiCorp Consul
Consul and Consul Enterprise’s (“Consul”) event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
AI Analysis
Technical Summary
CVE-2025-11375 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting HashiCorp Consul and Consul Enterprise's event endpoint. The root cause is the absence of a maximum limit on the Content-Length HTTP header, which allows an attacker to send excessively large payloads to the event endpoint. Since Consul processes these requests without enforcing size restrictions, this can lead to resource exhaustion such as memory or CPU overload, resulting in denial of service (DoS). The vulnerability requires only network access and low privileges (PR:L), with no user interaction needed, making it relatively easy to exploit remotely. The CVSS v3.1 score is 6.5 (medium severity), reflecting the high impact on availability but no impact on confidentiality or integrity. The vulnerability affects all versions prior to Consul Community Edition 1.22.0 and Enterprise versions 1.22.0, 1.21.6, 1.20.8, and 1.18.12, where the issue has been fixed. No public exploits or active exploitation have been reported yet, but the nature of the flaw means it could be leveraged to disrupt service availability in environments relying on Consul for service discovery and configuration management. Consul is widely used in cloud-native and microservices architectures, making this vulnerability relevant for organizations using these technologies.
Potential Impact
For European organizations, the primary impact of CVE-2025-11375 is the potential disruption of service availability due to denial of service attacks targeting Consul's event endpoint. Since Consul is commonly used for service discovery, configuration, and orchestration in cloud and DevOps environments, a successful attack could lead to cascading failures in dependent applications and services. This could affect critical infrastructure, financial services, telecommunications, and other sectors heavily reliant on cloud-native technologies. The lack of confidentiality or integrity impact limits data breach risks, but operational downtime could result in financial losses, reputational damage, and compliance issues under regulations like GDPR if service interruptions affect customer-facing systems. The ease of exploitation without user interaction increases the risk of automated attacks, potentially amplifying the threat in large-scale deployments. Organizations with extensive microservices architectures or multi-cloud environments using Consul are particularly vulnerable to availability degradation or outages.
Mitigation Recommendations
To mitigate CVE-2025-11375, European organizations should promptly upgrade to the fixed versions of Consul Community Edition (1.22.0 or later) and Consul Enterprise (1.22.0, 1.21.6, 1.20.8, or 1.18.12 and later). Until patching is complete, implement network-level protections such as rate limiting and request size restrictions on the event endpoint to prevent resource exhaustion. Deploy Web Application Firewalls (WAFs) or API gateways capable of enforcing maximum Content-Length headers and detecting anomalous traffic patterns. Monitor Consul logs and metrics for unusual spikes in request sizes or resource usage indicative of exploitation attempts. Isolate Consul instances within segmented network zones to limit exposure. Additionally, review and harden Consul configurations to minimize unnecessary exposure of the event endpoint to untrusted networks. Incorporate this vulnerability into incident response plans and conduct regular security assessments focusing on resource allocation and throttling controls.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
CVE-2025-11375: CWE-770: Allocation of Resources Without Limits or Throttling in HashiCorp Consul
Description
Consul and Consul Enterprise’s (“Consul”) event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-11375 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting HashiCorp Consul and Consul Enterprise's event endpoint. The root cause is the absence of a maximum limit on the Content-Length HTTP header, which allows an attacker to send excessively large payloads to the event endpoint. Since Consul processes these requests without enforcing size restrictions, this can lead to resource exhaustion such as memory or CPU overload, resulting in denial of service (DoS). The vulnerability requires only network access and low privileges (PR:L), with no user interaction needed, making it relatively easy to exploit remotely. The CVSS v3.1 score is 6.5 (medium severity), reflecting the high impact on availability but no impact on confidentiality or integrity. The vulnerability affects all versions prior to Consul Community Edition 1.22.0 and Enterprise versions 1.22.0, 1.21.6, 1.20.8, and 1.18.12, where the issue has been fixed. No public exploits or active exploitation have been reported yet, but the nature of the flaw means it could be leveraged to disrupt service availability in environments relying on Consul for service discovery and configuration management. Consul is widely used in cloud-native and microservices architectures, making this vulnerability relevant for organizations using these technologies.
Potential Impact
For European organizations, the primary impact of CVE-2025-11375 is the potential disruption of service availability due to denial of service attacks targeting Consul's event endpoint. Since Consul is commonly used for service discovery, configuration, and orchestration in cloud and DevOps environments, a successful attack could lead to cascading failures in dependent applications and services. This could affect critical infrastructure, financial services, telecommunications, and other sectors heavily reliant on cloud-native technologies. The lack of confidentiality or integrity impact limits data breach risks, but operational downtime could result in financial losses, reputational damage, and compliance issues under regulations like GDPR if service interruptions affect customer-facing systems. The ease of exploitation without user interaction increases the risk of automated attacks, potentially amplifying the threat in large-scale deployments. Organizations with extensive microservices architectures or multi-cloud environments using Consul are particularly vulnerable to availability degradation or outages.
Mitigation Recommendations
To mitigate CVE-2025-11375, European organizations should promptly upgrade to the fixed versions of Consul Community Edition (1.22.0 or later) and Consul Enterprise (1.22.0, 1.21.6, 1.20.8, or 1.18.12 and later). Until patching is complete, implement network-level protections such as rate limiting and request size restrictions on the event endpoint to prevent resource exhaustion. Deploy Web Application Firewalls (WAFs) or API gateways capable of enforcing maximum Content-Length headers and detecting anomalous traffic patterns. Monitor Consul logs and metrics for unusual spikes in request sizes or resource usage indicative of exploitation attempts. Isolate Consul instances within segmented network zones to limit exposure. Additionally, review and harden Consul configurations to minimize unnecessary exposure of the event endpoint to untrusted networks. Incorporate this vulnerability into incident response plans and conduct regular security assessments focusing on resource allocation and throttling controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- HashiCorp
- Date Reserved
- 2025-10-06T15:34:11.889Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690126348f7e67aef0117de7
Added to database: 10/28/2025, 8:23:16 PM
Last enriched: 10/28/2025, 8:36:05 PM
Last updated: 10/30/2025, 1:48:44 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighMajor US Telecom Backbone Firm Hacked by Nation-State Actors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.