CVE-2025-6011

A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*
cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*

History

13 Aug 2025, 18:10

Type Values Removed Values Added
References () https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034 - () https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034 - Vendor Advisory
CPE cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*
cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*
First Time Hashicorp
Hashicorp vault

04 Aug 2025, 15:06

Type Values Removed Values Added
Summary
  • (es) Un canal lateral de temporización en el método de autenticación por contraseña de usuario de Vault y Vault Enterprise (Vault) permitía a un atacante distinguir entre usuarios existentes y no existentes, y potencialmente enumerar nombres de usuario válidos para el método de autenticación por contraseña de Vault. Corregido en Vault Community Edition 1.20.1 y Vault Enterprise 1.20.1, 1.19.7, 1.18.12 y 1.16.23.

01 Aug 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-01 18:15

Updated : 2025-08-13 18:10


NVD link : CVE-2025-6011

Mitre link : CVE-2025-6011

CVE.ORG link : CVE-2025-6011


JSON object : View

Products Affected

hashicorp

  • vault
CWE
CWE-203

Observable Discrepancy