CVE-2021-32923
HashiCorp Vault vulnerability analysis and mitigation

Overview

HashiCorp Vault and Vault Enterprise experienced a vulnerability (CVE-2021-32923) that affected versions 0.10.0 through 1.7.1. The vulnerability was discovered and disclosed on May 20, 2021, allowing the renewal of nearly-expired token leases and dynamic secret leases within 1 second of their maximum TTL, which caused them to be incorrectly treated as non-expiring during subsequent use (HashiCorp Discussion).

Technical details

The vulnerability stemmed from a renewal logic flaw where token leases or dynamic secret leases renewed inside the last second of their maximum TTL would have their TTL set to the remaining seconds of maximum TTL (0 seconds, rounded down). This incorrect TTL setting caused these tokens and secrets to be treated as non-expiring during subsequent use. The exposure window was narrow and primarily affected automation-driven renewals operating under tight time tolerances (HashiCorp Discussion).

Impact

The vulnerability resulted in tokens and dynamic secrets living past their intended lifetime without being properly revoked. While Vault-issued tokens with non-expiring leases did not present direct security risks as Vault would not accept them as valid, Vault-issued dynamic secrets with non-expiring leases posed security risks since they were not revoked from the associated secrets engine and could be accepted as valid by the underlying service (HashiCorp Discussion).

Mitigation and workarounds

The vulnerability was fixed in Vault versions 1.5.9, 1.6.5, and 1.7.2. After upgrading, Vault automatically expires any existing token leases and dynamic secret leases that are non-expiring due to this renewal logic flaw. The fix includes rejecting renewal requests received for leases with less than 1 second remaining of their maximum TTL. Cleanup activities are logged in the Vault server log for further investigation (HashiCorp Discussion).

Additional resources


SourceThis report was generated using AI

Related HashiCorp Vault vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • opentelemetry-operator
NoYesDec 02, 2025
CVE-2025-63811HIGH7.5
  • HashiCorp VaultHashiCorp Vault
  • sql_exporter
NoYesNov 12, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • crossplane-function-environment-configs-fips
NoYesDec 03, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • azuredisk-csi-fips-1.29
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • argo-workflows-fips-3.7
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management