Introducing Wiz for Exposure Management: Unify, prioritize, and remediate exposures everywhere.

CVE-2025-6011
HashiCorp Vault vulnerability analysis and mitigation

Overview

A timing side channel vulnerability (CVE-2025-6011) was discovered in HashiCorp Vault and Vault Enterprise's userpass authentication method. The vulnerability was disclosed on August 1, 2025, affecting Vault Community Edition up to 1.20.0 and Vault Enterprise up to versions 1.20.0, 1.19.6, 1.18.11, and 1.16.22. This security flaw allowed attackers to distinguish between existing and non-existing users, potentially enabling the enumeration of valid usernames within Vault's userpass authentication system (HashiCorp Discussion).

Technical details

The vulnerability stems from a flawed implementation of timing attack mitigation in the userpass authentication method. While Vault attempted to prevent timing-based information leaks by using bcrypt with a placeholder string for non-existent usernames, the CompareHashAndPassword function would exit early if the hash format was invalid. This implementation weakness could be exploited to determine valid usernames. The vulnerability has been assigned a CVSS v3.1 base score of 3.7 (Low) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating a network-accessible vulnerability requiring high attack complexity with no privileges or user interaction required (NVD).

Impact

The vulnerability allows attackers to potentially enumerate valid usernames in Vault's userpass authentication method through timing analysis. This information disclosure could be used as a stepping stone for further attacks by identifying valid user accounts within the system (HashiCorp Discussion).

Mitigation and workarounds

HashiCorp has released patches to address this vulnerability. Users should upgrade to Vault Community Edition 1.20.1 or Vault Enterprise versions 1.20.1, 1.19.7, 1.18.12, or 1.16.23, depending on their current version. Organizations are advised to evaluate the risk and follow the general guidance provided in the Vault upgrading documentation (HashiCorp Discussion).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management