Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack

Posted on October 27, 2025October 27, 2025 By CWS

HashiCorp has disclosed two vital vulnerabilities in its Vault software program that would permit attackers to bypass authentication controls and launch denial-of-service (DoS) assaults.

Printed on October 23, 2025, these flaws have an effect on each Vault Neighborhood Version and Vault Enterprise, prompting pressing suggestions for upgrades.

The problems, tracked as CVE-2025-12044 and CVE-2025-11621, stem from misconfigurations in useful resource dealing with and authentication caching, doubtlessly exposing delicate information in enterprise environments.

Vault, a broadly used instrument for secrets and techniques administration, encryption, and identity-based entry, serves as a cornerstone for safe operations in cloud and hybrid infrastructures.

These vulnerabilities spotlight ongoing challenges in balancing efficiency with strong safety, particularly as organizations more and more depend on automated authentication strategies like AWS integration.

Denial-of-Service Flaw Via JSON Payload Exploitation

The primary vulnerability, CVE-2025-12044 (HCSEC-2025-30), allows an unauthenticated DoS assault by exploiting a regression in JSON payload processing.

This flaw arises from a earlier repair for HCSEC-2025-24, which addressed complicated JSON payloads that would exhaust assets.

In affected variations, Vault applies charge limits after parsing incoming JSON requests slightly than earlier than, permitting attackers to flood the system with giant, legitimate payloads underneath the max_request_size threshold.

Operators configure tunable charge limits and useful resource quotas in Vault to forestall abuse, however this ordering error lets repeated requests devour extreme CPU and reminiscence.

The consequence? Service unavailability or outright crashes disrupt entry to vital secrets and techniques and keys. No CVSS rating was instantly offered, however the unauthenticated nature elevates its severity, which HashiCorp charges as excessive threat.

This difficulty impacts Vault Neighborhood Version variations 1.20.3 to 1.20.4, with fixes accessible in 1.21.0.

For Vault Enterprise, affected releases span 1.20.3 to 1.20.4, 1.19.9 to 1.19.10, 1.18.14 to 1.18.15, and 1.16.25 to 1.16.26, patched in 1.21.0, 1.20.5, 1.19.11, and 1.16.27.

Authentication Bypass In AWS And EC2 Strategies

The second vulnerability, CVE-2025-11621 (additionally HCSEC-2025-30), poses an excellent graver menace by permitting authentication bypass in Vault’s AWS Auth methodology.

This methodology automates token retrieval for IAM principals and EC2 cases, however a flaw within the caching logic fails to validate the AWS account ID.

If the bound_principal_iam function matches throughout accounts or makes use of wildcards, an attacker from a unique account can impersonate a reputable person, resulting in unauthorized entry, information publicity, and privilege escalation.

A parallel difficulty impacts the EC2 authentication methodology, the place cache lookups solely test AMI IDs, not account IDs, enabling cross-account assaults.

Found by safety researcher Pavlos Karakalidis, who coordinated disclosure with HashiCorp, this flaw underscores the dangers of wildcard configurations in multi-account setups.

Affected variations are broader: Vault Neighborhood Version from 0.6.0 to 1.20.4 (mounted in 1.21.0), and Vault Enterprise from 0.6.0 to 1.20.4, plus 1.19.10, 1.18.15, and 1.16.26 (mounted in 1.21.0, 1.20.5, 1.19.11, and 1.16.27).

CVE IDDescriptionAffected Merchandise/VersionsCVSS ScoreFix VersionsCVE-2025-12044Unauthenticated DoS through JSON payloadsCommunity: 1.20.3-1.20.4Enterprise: 1.20.3-1.20.4, 1.19.9-1.19.10, 1.18.14-1.18.15, 1.16.25-1.16.26High (est.)Neighborhood: 1.21.0Enterprise: 1.21.0, 1.20.5, 1.19.11, 1.16.27CVE-2025-11621AWS/EC2 auth bypass through cache flawCommunity: 0.6.0-1.20.4Enterprise: 0.6.0-1.20.4, 1.19.10, 1.18.15, 1.16.26HighCommunity: 1.21.0Enterprise: 1.21.0, 1.20.5, 1.19.11, 1.16.27

Mitigations

HashiCorp urges fast upgrades to patched variations, following the official upgrading information.

For these unable to replace promptly, evaluate AWS auth configurations: get rid of wildcards in bound_principal_iam and audit for function identify collisions throughout accounts. Allow stricter account ID validation the place doable.

These vulnerabilities arrive amid rising scrutiny on secrets and techniques administration instruments, as attackers goal them for preliminary footholds. Organizations utilizing Vault in manufacturing ought to prioritize patching to safeguard in opposition to exploitation, which might cascade into broader breaches.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Authentication, Bypass, DoS, HashiCorp, Trigger, Vault, Vulnerabilities

Post navigation

Previous Post: Chrome Zero-Day Exploitation Linked to Hacking Team Spyware
Next Post: Ransomware Payments Dropped in Q3 2025: Analysis

Related Posts

VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support Cyber Security News
Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked Cyber Security News
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News
New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark