A vulnerability was identified in Consul such that unbounded resource usage, triggered by the establishment of many unauthenticated HTTP or RPC connections, may generate excessive load and/or crash the server.
This vulnerability affects all previous releases of Consul, and is fixed in the 1.6.3 release. For full details about the problem and how to remediate see issue 7159 on GitHub.
A low risk vulnerability was identified in Consul HTTP API such that the endpoints v1/agent/health/service/* did not enforce acl
This vulnerability affects Consul releases 1.4.1 until 1.6.2, and is fixed in 1.6.3. For full details about the problem and how to remediate see issue 7160 on GitHub.
Please see the complete changelog for details on the releases: