{"api_version":"1","generated_at":"2026-04-23T06:20:11+00:00","cve":"CVE-2023-1782","urls":{"html":"https://cve.report/CVE-2023-1782","api":"https://cve.report/api/cve/CVE-2023-1782.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1782","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1782"},"summary":{"title":"CVE-2023-1782","description":"HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.","state":"PUBLIC","assigner":"security@hashicorp.com","published_at":"2023-04-05 20:15:00","updated_at":"2023-04-12 19:34:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375","name":"https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375","refsource":"MISC","tags":[],"title":"HCSEC-2023-12 - Nomad Unauthenticated Client Agent HTTP Request Privilege Escalation - Security - HashiCorp Discuss","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1782","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1782","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1782","vulnerable":"1","versionEndIncluding":"1.5.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hashicorp","cpe5":"nomad","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1782","vulnerable":"1","versionEndIncluding":"1.5.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hashicorp","cpe5":"nomad","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-1782","qid":"503204","title":"Alpine Linux Security Update for nomad"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1782","ASSIGNER":"security@hashicorp.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862 Missing Authorization","cweId":"CWE-862"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"HashiCorp","product":{"product_data":[{"product_name":"Nomad","version":{"version_data":[{"version_affected":"<","version_name":"1.5.0","version_value":"1.5.3"}]}},{"product_name":"Nomad Enterprise","version":{"version_data":[{"version_affected":"<","version_name":"1.5.0","version_value":"1.5.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375","refsource":"MISC","name":"https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375"}]},"source":{"discovery":"INTERNAL"},"impact":{"cvss":[{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":10,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}},"nvd":{"publishedDate":"2023-04-05 20:15:00","lastModifiedDate":"2023-04-12 19:34:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:nomad:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.5.0","versionEndIncluding":"1.5.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:nomad:*:*:*:*:-:*:*:*","versionStartIncluding":"1.5.0","versionEndIncluding":"1.5.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}