First published: Thu Mar 30 2023(Updated: )
HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
Credit: security@hashicorp.com security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vault | <1.11.9 | |
HashiCorp Vault | <1.11.9 | |
HashiCorp Vault | >=1.12.0<1.12.5 | |
HashiCorp Vault | >=1.12.0<1.12.5 | |
HashiCorp Vault | >=1.13.0<1.13.1 | |
HashiCorp Vault | >=1.13.0<1.13.1 | |
redhat/vault | <1.13.1 | 1.13.1 |
redhat/vault | <1.12.5 | 1.12.5 |
redhat/vault | <1.11.9 | 1.11.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-25000.
The severity of CVE-2023-25000 is medium (5).
The software affected by CVE-2023-25000 is HashiCorp Vault.
An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force attack.
To fix CVE-2023-25000, update HashiCorp Vault to version 1.13.1, 1.12.5, or 1.11.9.