CVE-2025-6000

HashiCorp · HashiCorp Vault

A critical vulnerability has been identified in HashiCorp Vault, designated CVE-2025-6000 with a CVSS score of 9.1.

Executive summary

A critical vulnerability has been identified in HashiCorp Vault, designated CVE-2025-6000 with a CVSS score of 9.1. This flaw allows a highly privileged internal operator to escape the Vault environment and execute arbitrary code on the underlying host server. Successful exploitation could lead to a complete compromise of the server, theft of all managed secrets, and significant disruption to dependent services.

Vulnerability

This vulnerability allows for privilege escalation and remote code execution. An attacker who has already obtained privileged operator access within Vault's root namespace, specifically with write permissions to the sys/audit API endpoint, can exploit this flaw. The attack requires that a plugin directory is configured for the Vault instance. The attacker can then enable a file-based audit device, crafting a malicious file path that allows them to write an executable file (such as a custom plugin) into the configured plugin directory, leading to code execution on the host system.

Business impact

The vulnerability is rated as critical severity with a CVSS score of 9.1, posing a significant risk to the organization. Exploitation would grant an attacker full control over the host server running Vault, completely bypassing all of Vault's security boundaries. This could result in the exfiltration of all secrets, credentials, and sensitive data managed by Vault, leading to a catastrophic data breach. Furthermore, a compromised Vault server can be used as a pivot point for lateral movement, enabling attackers to compromise other critical systems within the network.

Remediation

Immediate Action: Immediately update all affected HashiCorp Vault instances to the latest patched version as recommended by the vendor. After patching, it is crucial to monitor for any signs of post-remediation exploitation attempts and thoroughly review historical access logs for indicators of compromise related to this vulnerability.

Proactive Monitoring: Security teams should scrutinize Vault audit logs for any unauthorized or suspicious modifications to the sys/audit endpoint, particularly the creation of new file type audit devices with unusual paths. Implement file integrity monitoring (FIM) on the Vault plugin directory to generate alerts for any new or modified files. Monitor for anomalous outbound network connections from the Vault host, which could indicate a successful compromise.

Compensating Controls: If patching cannot be performed immediately, implement the following controls:

  • Strictly review and limit operator permissions, revoking write access to the sys/audit endpoint in the root namespace for all non-essential personnel.
  • Enforce the principle of least privilege for all Vault roles and policies.
  • If a plugin directory is not required for business operations, remove it from the Vault configuration to eliminate the attack vector.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical severity (CVSS 9.1) and the potential for a complete host compromise, we recommend that organizations prioritize patching all vulnerable HashiCorp Vault instances immediately. Although this vulnerability is not currently listed on the CISA KEV list, its high impact warrants urgent attention. If patching is delayed, the compensating controls, especially the restriction of permissions to the sys/audit endpoint, must be implemented as a top priority to mitigate the risk of exploitation.