CVE-2021-43998
HashiCorp Vault vulnerability analysis and mitigation

Overview

HashiCorp Vault and Vault Enterprise versions 0.11.0 through 1.7.5 and 1.8.4 contained a vulnerability (CVE-2021-43998) where templated ACL policies would always match the first-created entity alias if multiple entity aliases existed for a specified entity and mount combination. This issue was discovered and reported by Christian Baumann and Nick Triller, and was fixed in versions 1.7.6, 1.8.5, and 1.9.0 (HashiCorp Advisory).

Technical details

The vulnerability affects Vault's identity secrets engine, which manages identity within Vault. The issue occurs when a single entity has multiple entity aliases for the same entity and mount combination while using templated ACL policies. In such cases, the permissions of the first-created entity alias continue to be enforced and are also applied to newly-created aliases, potentially resulting in incorrect policy enforcement. The vulnerability has a CVSS v3.1 base score of 6.5 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N (NVD).

Impact

The vulnerability could lead to incorrect policy enforcement in Vault deployments where multiple entity aliases exist for the same entity and mount combination. This might result in unintended access permissions being granted to users. However, HashiCorp's internal assessment indicated that exploitation requires high privileges, specifically write permissions to the identity/entity-alias endpoint, which is typically restricted to privileged Vault operators (HashiCorp Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Vault and Vault Enterprise versions 1.7.6, 1.8.5, and 1.9.0. The fix prevents the creation of new entity aliases if one already exists for a given entity and mount combination. Additionally, Vault now provides a warning to operators on startup if multiple entity aliases exist for the same entity and mount combination. Users are advised to upgrade to these patched versions (HashiCorp Advisory, Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Related HashiCorp Vault vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • hugo-extended
NoYesDec 02, 2025
CVE-2025-63811HIGH7.5
  • HashiCorp VaultHashiCorp Vault
  • grafana-alloy
NoYesNov 12, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • rancher-telemetry
NoYesDec 03, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • calico-3.29
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • op-geth
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management