CVE-2023-2197
HashiCorp Vault vulnerability analysis and mitigation

Overview

HashiCorp Vault Enterprise versions 1.13.0 up to 1.13.1 were identified to contain a vulnerability (CVE-2023-2197) where a padding oracle attack could be possible when using an HSM with CBC-based encryption mechanisms (CKMAESCBCPAD or CKMAES_CBC). The vulnerability was discovered and disclosed on May 1, 2023, and was subsequently fixed in version 1.13.2 (HashiCorp Discuss).

Technical details

The vulnerability stems from Vault not properly applying an HMAC to messages sent from the HSM when using a CBC-based encryption mechanism. This specifically affects Vault's root key wrapping functionality with an HSM, while other HSM functionalities remain protected due to Vault's defense-in-depth protection against message tampering. The vulnerability has been assigned a CVSS score of 2.5 (LOW) with the vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N (NetApp Security).

Impact

If successfully exploited, an attacker with privileges to modify storage and restart Vault may be able to intercept or modify ciphertext to derive Vault's root key. However, compromising the root key alone is not sufficient for compromising other Vault storage unless the HSM is also compromised, as the barrier keyring remains encrypted by the HSM (HashiCorp Discuss).

Mitigation and workarounds

Organizations using Vault Enterprise with HSM functionality utilizing either CKMAESCBCPAD or CKMAES_CBC encryption mechanisms should upgrade to Vault Enterprise version 1.13.2. After upgrading, it is recommended to rekey Vault using the 'vault operator rekey -init' command to generate new unseal keys (HashiCorp Discuss).

Community reactions

The vulnerability was identified by the Vault engineering team internally, demonstrating HashiCorp's proactive approach to security. The issue has been publicly discussed and acknowledged by major technology companies, including NetApp, who have assessed their products for potential impact (HashiCorp Discuss, NetApp Security).

Additional resources


SourceThis report was generated using AI

Related HashiCorp Vault vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-63811HIGH7.5
  • HashiCorp VaultHashiCorp Vault
  • dapr-1.15
NoYesNov 12, 2025
CVE-2025-61725HIGH7.5
  • cAdvisorcAdvisor
  • cluster-api-helm-controller
NoYesOct 29, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • cloud-provider-aws-fips-1.30
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • kyverno-policy-reporter-fips
NoYesNov 19, 2025
CVE-2025-61724MEDIUM5.3
  • cAdvisorcAdvisor
  • direnv
NoYesOct 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management