First published: Mon Jul 31 2023(Updated: )
HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.
Credit: security@hashicorp.com security@hashicorp.com security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vault | >=1.13.0<1.13.5 | |
HashiCorp Vault | >=1.13.0<1.13.5 | |
HashiCorp Vault | =1.14.0 | |
HashiCorp Vault | =1.14.0 | |
redhat/vault | <1.14.1 | 1.14.1 |
redhat/vault | <1.13.5 | 1.13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3462 is a vulnerability in HashiCorp's Vault and Vault Enterprise that allows user enumeration when using the LDAP auth method.
The vulnerability in CVE-2023-3462 allows an attacker to submit requests of existent and non-existent LDAP users to Vault and observe the response to check if the account is valid on the LDAP server.
The severity of CVE-2023-3462 is medium with a CVSS score of 5.3.
To fix CVE-2023-3462, ensure you are using Vault version 1.14.1 or Vault version 1.13.5.
You can find more information about CVE-2023-3462 on the HashiCorp discussion forum, NIST NVD, and GitHub advisory page.