Hashicorp

Vault

68 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 23.10.2025 19:15:48
  • Zuletzt bearbeitet 27.10.2025 13:20:15

Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in ...

  • EPSS 0.11%
  • Veröffentlicht 23.10.2025 19:15:16
  • Zuletzt bearbeitet 27.10.2025 13:20:15

Vault and Vault Enterprise (“Vault”) are vulnerable to an unauthenticated denial of service when processing JSON payloads. This occurs due to a regression from a previous fix for [+HCSEC-2025-24+|https://discuss.hashicorp.com/t/hcsec-2025-24-vault-de...

  • EPSS 0.03%
  • Veröffentlicht 28.08.2025 19:36:09
  • Zuletzt bearbeitet 29.08.2025 16:24:29

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially...

  • EPSS 0.02%
  • Veröffentlicht 06.08.2025 10:15:35
  • Zuletzt bearbeitet 06.08.2025 20:23:37

Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 a...

  • EPSS 0.02%
  • Veröffentlicht 01.08.2025 18:03:53
  • Zuletzt bearbeitet 13.08.2025 18:09:08

Vault and Vault Enterprise’s (“Vault”) login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.

  • EPSS 0.02%
  • Veröffentlicht 01.08.2025 18:00:24
  • Zuletzt bearbeitet 13.08.2025 18:10:13

A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vaul...

  • EPSS 0.04%
  • Veröffentlicht 01.08.2025 17:56:00
  • Zuletzt bearbeitet 13.08.2025 18:10:19

Vault and Vault Enterprise’s (“Vault”) user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.

  • EPSS 0.05%
  • Veröffentlicht 01.08.2025 17:52:48
  • Zuletzt bearbeitet 13.08.2025 18:09:00

Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as [+trusted certificate+|https://developer.hashicorp.com/vault/api-docs/auth/cert#certificate]....

  • EPSS 0.03%
  • Veröffentlicht 01.08.2025 17:50:09
  • Zuletzt bearbeitet 13.08.2025 18:09:14

Vault and Vault Enterprise’s (“Vault”) TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.

  • EPSS 0.06%
  • Veröffentlicht 01.08.2025 17:40:48
  • Zuletzt bearbeitet 13.08.2025 18:08:08

A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Ent...