A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 04 Aug 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Hashicorp
Hashicorp vault Hashicorp vault Enterprise |
|
Vendors & Products |
Hashicorp
Hashicorp vault Hashicorp vault Enterprise |
Fri, 01 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 01 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23. | |
Title | Timing Side-Channel in Vault’s Userpass Auth Method | |
Weaknesses | CWE-203 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: HashiCorp
Published: 2025-08-01T18:00:24.528Z
Updated: 2025-08-01T19:06:58.251Z
Reserved: 2025-06-11T18:57:02.577Z
Link: CVE-2025-6011

Updated: 2025-08-01T19:06:49.033Z

Status : Awaiting Analysis
Published: 2025-08-01T18:15:56.713
Modified: 2025-08-04T15:06:15.833
Link: CVE-2025-6011
