8.1
CVE-2025-11621
- EPSS 0.05%
- Veröffentlicht 23.10.2025 19:15:48
- Zuletzt bearbeitet 27.10.2025 13:20:15
- Quelle security@hashicorp.com
- CVE-Watchlists
- Unerledigt
Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerHashiCorp
≫
Produkt
Vault
Default Statusunaffected
Version <
1.21.0
Version
0.6.0
Status
affected
HerstellerHashiCorp
≫
Produkt
Vault Enterprise
Default Statusunaffected
Version <
1.21.0
Version
0.6.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.156 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@hashicorp.com | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.