CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials

0
109

[ad_1]

Cybersecurity researchers have found over a dozen vulnerabilities in enterprise safe vaults from CyberArk and HashiCorp that, if efficiently exploited, can permit distant attackers to crack open company identification programs and extract enterprise secrets and techniques and tokens from them.

The 14 vulnerabilities, collectively named Vault Fault, have an effect on CyberArk Secrets Manager, Self-Hosted, and Conjur Open Source and HashiCorp Vault, in response to a report from an identification safety agency Cyata. Following accountable disclosure in May 2025, the issues have been addressed within the following variations –

These embody authentication bypasses, impersonation, privilege escalation bugs, code execution pathways, and root token theft. The most extreme of the problems permits for distant code execution, permitting attackers to takeover the vault underneath sure circumstances with none legitimate credentials –

  • CVE-2025-49827 (CVSS rating: 9.1) – Bypass of IAM authenticator in CyberArk Secrets Manager
  • CVE-2025-49831 (CVSS rating: 9.1) – Bypass of IAM authenticator in CyberArk Secrets Manager by way of a misconfigured community gadget
  • CVE-2025-49828 (CVSS rating: 8.6) – Remote code execution in CyberArk Secrets Manager
  • CVE-2025-6000 (CVSS rating: 9.1) – Arbitrary distant code execution by way of plugin catalog abuse in HashiCorp Vault
  • CVE-2025-5999 (CVSS rating: 7.2) – Privilege escalation to root by way of coverage normalization in HashiCorp Vault

In addition, vulnerabilities have additionally been found in HashiCorp Vault’s lockout safety logic, which is designed to throttle brute-force makes an attempt, that would allow an attacker to deduce which usernames are legitimate by benefiting from a timing-based aspect channel and even reset the lockout counter by altering the case of a identified username (e.g., admin to Admin).

Cybersecurity

Two different shortcomings recognized by the Israeli firm made it potential to weaken lockout enforcement and bypass multi-factor authentication (MFA) controls when username_as_alias=true within the LDAP auth configuration and MFA enforcement is utilized on the EntityID or IdentityGroup degree.

In the assault chain detailed by the cybersecurity firm, it is potential to leverage a certificates entity impersonation concern (CVE-2025-6037) with CVE-2025-5999 and CVE-2025-6000 to interrupt the authentication layer, escalate privileges, and obtain code execution. CVE-2025-6037 and CVE-2025-6000 are stated to have existed for over eight and 9 years, respectively.

Armed with this functionality, a risk actor might additional weaponize the entry to delete the “core/hsm/_barrier-unseal-keys” file, successfully turning a safety characteristic right into a ransomware vector. What’s extra, the Control Group characteristic will be undermined to ship HTTP requests and obtain responses with out being audited, making a stealthy communication channel.

“This analysis reveals how authentication, coverage enforcement, and plugin execution can all be subverted by logic bugs, with out touching reminiscence, triggering crashes, or breaking cryptography,” safety researcher Yarden Porat stated.

In an analogous vein, the vulnerabilities found in CyberArk Secrets Manager/Conjur permit for authentication bypass, privilege escalation, info disclosure, and arbitrary code execution, successfully opening the door to a state of affairs the place an attacker can craft an exploit chain to acquire unauthenticated entry and run arbitrary instructions.

The assault sequence unfolds as follows –

  • IAM authentication bypass by forging valid-looking GetCallerIdentity responses
  • Authenticate as a coverage useful resource
  • Abuse the Host Factory endpoint to create a brand new host that impersonates a sound coverage template
  • Assigned a malicious Embedded Ruby (ERB) payload on to the host
  • Trigger the execution of the connected ERB by invoking the Policy Factory endpoint

“This exploit chain moved from unauthenticated entry to full distant code execution with out ever supplying a password, token, or AWS credentials,” Porat famous.

The disclosure comes as Cisco Talos detailed safety flaws in Dell’s ControlVault3 Firmware and its related Windows APIs that would have been abused by attackers to bypass Windows login, extract cryptographic keys, in addition to keep entry even after a contemporary working system set up by deploying undetectable malicious implants into the firmware.

Identity Security Risk Assessment

Together, these vulnerabilities create a potent distant post-compromise persistence technique for covert entry to high-value environments. The recognized vulnerabilities are as follows –

  • CVE-2025-25050 (CVSS rating: 8.8) – An out-of-bounds write vulnerability exists within the cv_upgrade_sensor_firmware performance that would result in an out-of-bounds write
  • CVE-2025-25215 (CVSS rating: 8.8) – An arbitrary free vulnerability exists within the cv_close performance that would result in an arbitrary free
  • CVE-2025-24922 (CVSS rating: 8.8) – A stack-based buffer overflow vulnerability exists within the securebio_identify performance that would result in arbitrary code execution
  • CVE-2025-24311 (CVSS rating: 8.4) – An out-of-bounds learn vulnerability exists within the cv_send_blockdata performance that would result in an info leak
  • CVE-2025-24919 (CVSS rating: 8.1) – A deserialization of untrusted enter vulnerability exists within the cvhDecapsulateCmd performance that would result in arbitrary code execution

The vulnerabilities have been codenamed ReVault. More than 100 fashions of Dell laptops operating Broadcom BCM5820X collection chips are affected. There isn’t any proof that the vulnerabilities have been exploited within the wild.

The cybersecurity firm additionally identified {that a} native attacker with bodily entry to a consumer’s laptop computer might pry it open and entry the Unified Security Hub (USH) board, permitting an attacker to use any of the 5 vulnerabilities with out having to log in or possess a full-disk encryption password.

“The ReVault assault can be utilized as a post-compromise persistence approach that may stay even throughout Windows reinstalls,” Cisco Talos researcher Philippe Laulheret stated. “The ReVault assault will also be used as a bodily compromise to bypass Windows Login and/or for any native consumer to achieve Admin/System privileges.”

To mitigate the danger posed by these flaws, customers are suggested to use the fixes offered by Dell; disable ControlVault providers if peripherals like fingerprint readers, good card readers, and near-field communication (NFC) readers aren’t getting used; and switch off fingerprint login in high-risk conditions.

LEAVE A REPLY

Please enter your comment!
Please enter your name here