CVE-2025-12044

7.5 HIGH

📋 TL;DR

Vault and Vault Enterprise are vulnerable to unauthenticated denial of service attacks when processing JSON payloads due to a regression in rate limiting. This allows attackers to send specially crafted JSON requests to exhaust system resources and cause service disruption. All users running vulnerable versions of Vault are affected.

💻 Affected Systems

Products:
  • Vault Community Edition
  • Vault Enterprise
Versions: All versions before Vault Community Edition 1.21.0 and Vault Enterprise 1.16.27, 1.19.11, 1.20.5, and 1.21.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations where Vault accepts JSON payloads via API endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage making Vault unavailable for authentication, secrets management, and encryption services, potentially disrupting dependent applications and workflows.

🟠

Likely Case

Service degradation or temporary unavailability affecting authentication flows, secret retrieval, and encryption operations until the attack stops or systems recover.

🟢

If Mitigated

Minimal impact with proper network controls, rate limiting at infrastructure level, and monitoring to detect and block attack patterns quickly.

🌐 Internet-Facing: HIGH - Unauthenticated exploit means any internet-facing Vault instance can be targeted without credentials.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to Vault endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is a regression from a previously fixed issue, suggesting similar exploitation techniques may work. Unauthenticated nature makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vault Community Edition 1.21.0, Vault Enterprise 1.16.27, 1.19.11, 1.20.5, or 1.21.0

Vendor Advisory: https://discuss.hashicorp.com/t/hcsec-2025-31-vault-vulnerable-to-denial-of-service-due-to-rate-limit-regression/76710

Restart Required: Yes

Instructions:

1. Download patched version from HashiCorp releases. 2. Backup Vault configuration and data. 3. Stop Vault service. 4. Install patched version. 5. Restart Vault service. 6. Verify service functionality.

🔧 Temporary Workarounds

Network-level rate limiting

all

Implement rate limiting at load balancer or firewall level to restrict JSON payload requests

API gateway protection

all

Deploy API gateway with request validation and size limits for JSON payloads

🧯 If You Can't Patch

  • Implement strict network ACLs to restrict Vault API access to trusted sources only
  • Deploy WAF with JSON payload inspection and request throttling capabilities

🔍 How to Verify

Check if Vulnerable:

Check Vault version via API: curl -s http://vault-server:8200/v1/sys/health | grep version

Check Version:

vault version

Verify Fix Applied:

Confirm version is patched: vault version should show 1.21.0+ for Community or 1.16.27+/1.19.11+/1.20.5+/1.21.0+ for Enterprise

📡 Detection & Monitoring

Log Indicators:

  • High volume of JSON parsing errors
  • Increased memory/CPU usage spikes
  • Request timeouts on API endpoints

Network Indicators:

  • Unusual volume of POST requests with JSON payloads
  • Requests with malformed or complex JSON structures

SIEM Query:

source="vault" AND ("json parse" OR "rate limit") AND severity=ERROR | stats count by src_ip

🔗 References

📤 Share & Export