Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13357: CWE-1188: Initialization of a Resource with an Insecure Default in HashiCorp Tooling

0
High
VulnerabilityCVE-2025-13357cvecve-2025-13357cwe-1188
Published: Fri Nov 21 2025 (11/21/2025, 15:02:27 UTC)
Source: CVE Database V5
Vendor/Project: HashiCorp
Product: Tooling

Description

Vault’s Terraform Provider incorrectly set the default deny_null_bind parameter for the LDAP auth method to false by default, potentially resulting in an insecure configuration. If the underlying LDAP server allowed anonymous or unauthenticated binds, this could result in authentication bypass. This vulnerability, CVE-2025-13357, is fixed in Vault Terraform Provider v5.5.0.

AI-Powered Analysis

AILast updated: 11/28/2025, 22:48:19 UTC

Technical Analysis

CVE-2025-13357 is a vulnerability classified under CWE-1188, which concerns the initialization of a resource with insecure default settings. Specifically, in HashiCorp Vault’s Terraform Provider version 4.2.0, the LDAP authentication method incorrectly sets the deny_null_bind parameter to false by default. This parameter controls whether LDAP anonymous or unauthenticated binds are denied. When set to false, it allows such binds, which can lead to an authentication bypass if the LDAP server itself permits anonymous binds. This means an attacker could potentially authenticate without valid credentials, gaining unauthorized access to Vault-managed secrets or infrastructure configurations. The vulnerability has a CVSS 3.1 base score of 7.4, indicating high severity, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N. This means the attack can be performed remotely without privileges or user interaction but requires high attack complexity, likely due to needing specific LDAP server conditions. The vulnerability affects Vault Terraform Provider version 4.2.0 and is resolved in version 5.5.0. No known exploits are currently reported in the wild. The issue highlights the risk of insecure default configurations in security-critical tooling, emphasizing the need for secure defaults and proper configuration validation. Organizations relying on HashiCorp Vault with LDAP authentication should verify their deny_null_bind settings and upgrade to the patched version to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data managed through HashiCorp Vault, especially in environments where LDAP servers allow anonymous binds. Unauthorized access could lead to exposure of secrets, credentials, and infrastructure configurations, potentially enabling further lateral movement or data breaches. Given the widespread adoption of HashiCorp Vault and Terraform in cloud and DevOps environments across Europe, the impact could affect sectors such as finance, healthcare, government, and critical infrastructure. The vulnerability does not affect availability directly but compromises trust in authentication mechanisms. Organizations with complex LDAP setups or legacy configurations are particularly vulnerable. The risk is elevated in multi-tenant or hybrid cloud environments where Vault is used to manage secrets across diverse systems. Failure to patch or audit LDAP bind settings could result in compliance violations under GDPR and other data protection regulations due to unauthorized data access.

Mitigation Recommendations

1. Immediately upgrade the Vault Terraform Provider to version 5.5.0 or later, where the deny_null_bind parameter default is securely set. 2. Audit all LDAP authentication configurations in Vault to ensure deny_null_bind is explicitly set to true, preventing anonymous binds. 3. Review and harden LDAP server configurations to disallow anonymous or unauthenticated binds at the directory level. 4. Implement monitoring and alerting for unusual authentication patterns or anonymous bind attempts in LDAP logs. 5. Conduct penetration testing and configuration reviews focusing on LDAP authentication flows within Vault environments. 6. Educate DevOps and security teams about the risks of insecure defaults and enforce secure configuration baselines for infrastructure-as-code tools. 7. Integrate configuration management tools to enforce deny_null_bind=true in Terraform scripts and Vault policies. 8. Consider network segmentation and access controls to limit exposure of LDAP and Vault services to trusted networks only. 9. Maintain up-to-date inventories of Vault provider versions deployed across environments to ensure timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
HashiCorp
Date Reserved
2025-11-18T15:38:23.306Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920823c0f995c4f64ea2855

Added to database: 11/21/2025, 3:16:12 PM

Last enriched: 11/28/2025, 10:48:19 PM

Last updated: 1/7/2026, 4:20:51 AM

Views: 293

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats