HomeHashicorpCVE-2025-6011

CVE-2025-6011

LOW
3.7CVSS
Published: 2025-08-01
Updated: 2025-08-13
AI Analysis

Description

A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-203

Metadata

Primary Vendor
HASHICORP
Published
8/1/2025
Last Modified
8/13/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

hashicorp : vaulthashicorp : vaulthashicorp : vaulthashicorp : vaulthashicorp : vault

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-6011 | LOW Severity | CVEDatabase.com | CVEDatabase.com