Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as [+trusted certificate+|https://developer.hashicorp.com/vault/api-docs/auth/cert#certificate]. In this configuration, an attacker may be able to craft a malicious certificate that could be used to impersonate another user. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
CVSS
No CVSS.
References
Configurations
Configuration 1 (hide)
|
History
13 Aug 2025, 18:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:* cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:* cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:* |
|
References | () https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037 - Vendor Advisory | |
First Time |
Hashicorp
Hashicorp vault |
01 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-01 18:15
Updated : 2025-08-13 18:09
NVD link : CVE-2025-6037
Mitre link : CVE-2025-6037
JSON object : View
Products Affected
hashicorp
- vault
CWE
No CWE.