Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code

Posted on August 7, 2025August 7, 2025 By CWS

Safety researchers uncovered a collection of crucial zero-day vulnerabilities in HashiCorp Vault in early August 2025, the broadly adopted secrets and techniques administration resolution.

These flaws, spanning authentication bypasses, coverage enforcement inconsistencies, and audit-log abuse, create end-to-end assault paths that culminate in distant code execution (RCE) on Vault servers.

Preliminary proof of logic-level defects emerged from handbook code critiques of Vault’s request routing and plugin interfaces, revealing stealthy logic mismatches quite than standard reminiscence corruption exploits.

As organizations more and more depend on Vault to safeguard API keys, certificates, and encryption keys in multi-cloud environments, the invention of those flaws sends shockwaves by means of the cybersecurity group.

CYATA analysts famous that some vulnerabilities continued for practically a decade, quietly embedded in core authentication flows and solely lately uncovered by meticulous handbook auditing.

Userpass Login Circulate (Supply – Cyata)

The affect extends past proof-of-concepts: attackers can chain these points to bypass lockout protections in userpass and LDAP backends, evade TOTP MFA constraints, impersonate machine identities through certificates authentication, and eventually escalate privileges from admin tokens to root.

The distant code execution approach is novel in Vault’s historical past. Reasonably than exploiting buffer overflows, adversaries leverage the archive of audit logs—written in plaintext—to inject a crafted shell payload into Vault’s plugin listing.

LDAP Login Circulate (Supply – Cyata)

By configuring an audit backend with a customized prefix containing a shebang and Bash instructions, attackers coerce Vault into writing executable scripts.

Subsequent retrieval of the precise payload through a TCP-stream audit backend permits computation of an identical SHA256 hash, satisfying Vault’s plugin registration necessities and triggering code execution.

Exploit chain (Supply – Cyata)

Organizations are urged to improve instantly to patched variations launched alongside accountable disclosure. HashiCorp has issued advisory updates addressing all 9 CVEs, reinforcing normalization routines and tightening coverage checks.

The coordinated response between CYATA and HashiCorp exemplifies efficient vulnerability administration, but underscores the necessity for deep logic validation alongside commonplace fuzzing and penetration testing.

Persistence Ways: Audit-Log-Based mostly Shell Injection

Essentially the most placing persistence tactic abuses Vault’s audit logging subsystem to implant malicious code.

Vault helps a number of concurrent audit backends, every able to writing structured JSON to arbitrary file paths with configurable file modes.

Attackers start by probing the plugin catalog endpoint (POST /v1/sys/plugins/catalog/:kind/:identify) with a non-existent plugin identify, eliciting an error that leaks absolutely the plugin_directory path. Subsequent, they permit a file-based audit backend:-

audit “file” {
log_path = “/choose/vault/plugins/evil.sh”
prefix = “#!/bin/bashn$(cat /tmp/secret_payload)n”
mode = “0755”
}

Upon sending any Vault request, the prefix is prepended to every JSON entry, inflicting Vault to create /choose/vault/plugins/evil.sh with executable permissions.

Concurrently, a TCP audit backend streams the an identical payload to an attacker-controlled socket, making certain the precise bytes will be hashed. Lastly, the adversary points:-

vault write sys/plugins/catalog/secret/evil
sha256=”” command=”evil.sh”

Vault then masses evil.sh as a plugin, executing it inside the Vault course of and granting arbitrary code execution privileges.

Whereas the next desk enumerates the important thing CVEs, their technical root causes, and attacker impacts:-

CVERoot CauseAttacker ImpactCVE-2025-6004Username lockout bypass through case and whitespaceUnlimited brute-force makes an attempt; username enumerationCVE-2025-6011Timing distinction on bcrypt skip for non-existent usersUsername validation oracle; focused credential attacksCVE-2025-6003MFA bypass when username_as_alias=true and EntityID mismatchSilently skips TOTP requirement beneath sure LDAP configurationsCVE-2025-6016Combined TOTP logic flaws (replay, charge restrict evasion)Brute-force legitimate TOTP codes; bypass one-time use and rate-limitingCVE-2025-6037CN unchecked in non-CA cert authImpersonation of arbitrary machine identities with legitimate public keyCVE-2025-5999Policy normalization mismatchAdmin can assign ” root” or uppercase “ROOT” coverage names to escalate to root privilegesCVE-2025-6000Audit-log prefix abuse for plugin creationRemote code execution with no reminiscence corruption through malicious audit-log-backed plugin registration

This wave of logic-level vulnerabilities highlights that even memory-safe architectures can harbor crucial flaws when enter normalization and coverage enforcement diverge.

Cybersecurity groups should increase black-box testing with thorough supply evaluation to uncover refined trust-model inconsistencies earlier than adversaries exploit them.

Equip your SOC with full entry to the most recent menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:0Day, Attackers, Code, Execute, HashiCorp, Remote, Vault, Vulnerabilities

Post navigation

Previous Post: 1.2 Million Healthcare Devices and Systems Data Leaked Online
Next Post: New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites

Related Posts

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
H2Miner Attacking Linux, Windows, and Containers to Mine Monero Cyber Security News
HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment
  • Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups
  • 10 Best Data Loss Prevention Software in 2025
  • New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites
  • HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment
  • Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups
  • 10 Best Data Loss Prevention Software in 2025
  • New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites
  • HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News