Categories: Cyber Security News

HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials

A critical security flaw has been discovered in HashiCorp’s Vault Terraform Provider that could allow attackers to bypass authentication and access Vault without valid credentials.

The vulnerability, tracked as CVE-2025-13357, affects organizations using LDAP authentication with Vault. The security issue stems from an incorrect default configuration in Vault’s Terraform Provider.

Specifically, the provider set the deny_null_bind parameter to false by default for the LDAP authentication method.

HashiCorp Vault Vulnerability

This misconfiguration created a dangerous security gap because the underlying LDAP server permitted unauthenticated connections.

When exploited, this vulnerability allows threat actors to authenticate to Vault without providing legitimate credentials.

This authentication bypass poses significant risks to organizations storing sensitive secrets, encryption keys, and other critical data in Vault.

CVE ID Affected Products Affected Versions Impact
CVE-2025-13357 Vault Terraform Provider v4.2.0 to v5.4.0 Authentication Bypass

HashiCorp has released fixes addressing this vulnerability. Organizations should take the following actions:

Update to Vault Terraform Provider v5.5.0, which correctly sets the deny_null_bind parameter to true by default.

Additionally, upgrade to Vault Community Edition 1.21.1 or Vault Enterprise versions 1.21.1, 1.20.6, 1.19.12, or 1.16.28.

Ensure the deny_null_bind parameter is explicitly set to true in LDAP auth method configurations.

Organizations using older provider versions should explicitly set the parameter in their Terraform files and apply the changes immediately.

The patched Vault versions no longer accept empty password strings, effectively preventing unauthenticated LDAP connections via the authentication method.

HashiCorp has announced that this outdated parameter will be removed in future releases. This vulnerability was identified by a third-party researcher who responsibly disclosed it to HashiCorp.

Organizations using Vault with LDAP authentication should prioritize applying these security updates to protect their infrastructure from potential exploitation.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Taylor Swift’s Role in Toy Story 5 Seems Obvious to Toy Story 2 Fans

Hi, Swifties. We don’t tend to have a lot in the way of Taylor Swift…

6 minutes ago

Trellix Source Code Breach – Hackers Gain Unauthorized Access to Repository

Cybersecurity giant Trellix has disclosed a significant security incident involving unauthorized access to a portion…

25 minutes ago

Hackers Breach Government and Military Servers by Exploiting cPanel Vulnerability

A sophisticated adversarial campaign targeting South-East Asian government and military infrastructure, combining rapid exploitation of…

25 minutes ago

‘What if they knew?’: Mental healthworkers break silence on their struggles

Cynthia Whitaker sat alone on a bench at center stage, her face bathed in a…

50 minutes ago

NBC Cancels Brilliant Minds and Stumble While 3 Other Shows Reportedly Wait in Limbo

Brilliant Minds and Stumble have both been canceled at NBC. Entertainment Weekly reported that the…

1 hour ago

The 10 Most Anticipated TV Shows to Stream in May

We noted this last month, but we really mean it in May: Things are starting…

2 hours ago

This website uses cookies.