CVE-2025-54997

9.1 CRITICAL

📋 TL;DR

This vulnerability allows privileged OpenBao operators to bypass security restrictions and execute arbitrary code on the underlying host by manipulating log prefixes through the audit subsystem. It affects OpenBao deployments running versions 2.3.1 and below where operators are intentionally restricted from executing system code or making network connections. The issue violates the intended security model of these deployments.

💻 Affected Systems

Products:
  • OpenBao
Versions: 2.3.1 and below
Operating Systems: All platforms running OpenBao
Default Config Vulnerable: ✅ No
Notes: Only affects deployments where operators are intentionally restricted from executing system code or making network connections. Standard OpenBao deployments without these restrictions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged operators gain full remote code execution on the OpenBao host, potentially compromising the entire secrets management infrastructure and accessing all stored secrets, certificates, and keys.

🟠

Likely Case

Malicious or compromised privileged operators bypass security controls to execute unauthorized code, access restricted network resources, and potentially exfiltrate sensitive data from the secrets vault.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized operators who might still bypass some restrictions but are subject to audit trails and accountability measures.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires privileged operator access. The vulnerability is in the audit subsystem's log prefix handling, which can be manipulated to bypass restrictions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.2

Vendor Advisory: https://github.com/openbao/openbao/security/advisories/GHSA-xp75-r577-cvhp

Restart Required: Yes

Instructions:

1. Backup OpenBao configuration and data. 2. Download OpenBao 2.3.2 from official releases. 3. Stop OpenBao service. 4. Replace binary with patched version. 5. Restart OpenBao service. 6. Verify functionality and monitor logs.

🔧 Temporary Workarounds

Block audit endpoint access

all

Implement explicit deny policies to block access to sys/audit/* endpoints for non-root operators

path "sys/audit/*" { capabilities = ["deny"] }

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for privileged operators
  • Deploy network segmentation to limit potential lateral movement from compromised OpenBao instances

🔍 How to Verify

Check if Vulnerable:

Check OpenBao version: if version is 2.3.1 or below and deployment restricts operator code execution/network access, system is vulnerable.

Check Version:

openbao version

Verify Fix Applied:

Verify OpenBao version is 2.3.2 or higher and test that privileged operators cannot bypass code execution/network restrictions via audit subsystem.

📡 Detection & Monitoring

Log Indicators:

  • Unusual audit log prefix modifications
  • Unexpected code execution attempts from OpenBao process
  • Suspicious network connections originating from OpenBao host

Network Indicators:

  • Outbound connections from OpenBao host to unexpected destinations
  • Unusual traffic patterns from OpenBao service ports

SIEM Query:

source="openbao" AND (event="audit_log_modification" OR process_execution="unexpected" OR network_connection="unauthorized")

🔗 References

📤 Share & Export