CVE-2024-0831
HashiCorp Vault vulnerability analysis and mitigation

Overview

HashiCorp Vault and Vault Enterprise versions 1.15.0 through 1.15.4 contain a vulnerability (CVE-2024-0831) that could expose sensitive information when configuring audit devices. The vulnerability was discovered by the Vault engineering team and was fixed in version 1.15.5. The issue affects the audit device configuration when using the log_raw option (HashiCorp Advisory).

Technical details

The vulnerability occurs when enabling an audit device with the log_raw option set to true. In affected versions, instead of applying only to the specified audit device, the log_raw setting is applied globally to all configured audit devices in the Vault deployment. This results in sensitive data being logged in clear text across all audit devices, regardless of their individual configurations. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N (NVD).

Impact

When exploited, this vulnerability could lead to the disclosure of sensitive information in audit logs where such data should have been hashed. Normally, sensitive information like passwords should be hashed using HMAC-SHA256 with a salt, but the vulnerability causes this data to be logged in its raw format across all audit devices, potentially exposing confidential information (HashiCorp Docs).

Mitigation and workarounds

Organizations should upgrade to Vault version 1.15.5 or newer to address this vulnerability. For systems running vulnerable versions, it is recommended to disable any audit devices that use the log_raw option. Additionally, organizations should evaluate their audit logs for any sensitive data that may have been captured and consider appropriate actions such as rotation or revocation if necessary (HashiCorp Advisory).

Additional resources


SourceThis report was generated using AI

Related HashiCorp Vault vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • libcap-static
NoYesDec 02, 2025
CVE-2025-63811HIGH7.5
  • HashiCorp VaultHashiCorp Vault
  • vault-fips-1.19
NoYesNov 12, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • portieris-fips
NoYesDec 03, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • eks-distro-fips-1.32
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • tekton-pipelines-1.0
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management