CVE-2025-1296

6.5 MEDIUM

📋 TL;DR

Nomad audit logs unintentionally expose sensitive workload identity tokens and client secret tokens. This allows attackers with access to audit logs to impersonate workloads or clients. Affects Nomad Community and Enterprise editions before patched versions.

💻 Affected Systems

Products:
  • Nomad Community
  • Nomad Enterprise
Versions: All versions before Nomad Community 1.9.7, Nomad Enterprise 1.9.7, 1.8.11, and 1.7.19
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when audit logging is enabled and logs contain sensitive token data.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain workload identity tokens and client secret tokens, enabling them to impersonate legitimate workloads or clients, potentially accessing sensitive data or performing unauthorized actions.

🟠

Likely Case

Internal actors or attackers with log access harvest tokens for lateral movement or privilege escalation within the Nomad environment.

🟢

If Mitigated

With proper log access controls and monitoring, exposure is limited to authorized personnel only, reducing risk of token misuse.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to audit logs where tokens are exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Nomad Community 1.9.7, Nomad Enterprise 1.9.7, 1.8.11, or 1.7.19

Vendor Advisory: https://discuss.hashicorp.com/t/hcsec-2025-04-nomad-exposes-sensitive-workload-identity-and-client-secret-token-in-audit-logs/73737

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Download patched version from HashiCorp. 3. Stop Nomad service. 4. Install patched version. 5. Restart Nomad service. 6. Verify version and functionality.

🔧 Temporary Workarounds

Disable audit logging

all

Temporarily disable audit logging to prevent token exposure until patching.

nomad audit disable

Restrict audit log access

all

Implement strict access controls and encryption for audit log storage.

🧯 If You Can't Patch

  • Implement strict access controls on audit log storage and transmission
  • Monitor audit logs for unauthorized access attempts and token harvesting patterns

🔍 How to Verify

Check if Vulnerable:

Check Nomad version and audit log configuration. If audit logging is enabled and version is below patched versions, system is vulnerable.

Check Version:

nomad version

Verify Fix Applied:

Verify Nomad version is 1.9.7 or higher (Community) or 1.9.7/1.8.11/1.7.19 (Enterprise). Confirm audit logs no longer contain sensitive tokens.

📡 Detection & Monitoring

Log Indicators:

  • Audit logs containing workload identity tokens or client secret tokens in plaintext
  • Unauthorized access attempts to audit log files

Network Indicators:

  • Unusual token usage patterns from unexpected sources

SIEM Query:

source="nomad_audit.log" AND (token OR secret) AND NOT hash

🔗 References

📤 Share & Export