Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6203: CWE-770: Allocation of Resources Without Limits or Throttling in HashiCorp Vault

0
High
VulnerabilityCVE-2025-6203cvecve-2025-6203cwe-770
Published: Thu Aug 28 2025 (08/28/2025, 19:36:09 UTC)
Source: CVE Database V5
Vendor/Project: HashiCorp
Product: Vault

Description

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

AI-Powered Analysis

AILast updated: 10/23/2025, 18:44:50 UTC

Technical Analysis

CVE-2025-6203 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting HashiCorp Vault, a widely used secrets management tool. The flaw allows a remote attacker to submit a complex, specially crafted payload that respects the default request size limit but triggers excessive consumption of CPU and memory resources within Vault. This resource exhaustion primarily impacts Vault’s auditing subroutine, causing it to timeout and potentially making the Vault server unresponsive. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The root cause is the lack of effective throttling or limits on resource allocation when processing certain complex payloads. The consequence is a denial-of-service (DoS) condition that disrupts Vault’s availability, which is critical since Vault is often used to secure sensitive credentials and infrastructure secrets. The vulnerability affects Vault Community Edition version 1.15.0 and earlier, with fixed versions released in Community Edition 1.20.3 and Enterprise Editions 1.20.3, 1.19.9, 1.18.14, and 1.16.25. No known exploits are currently observed in the wild, but the vulnerability’s characteristics suggest it could be weaponized by attackers to disrupt services. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and high impact on availability. Organizations using vulnerable Vault versions should prioritize patching and consider additional mitigations to prevent resource exhaustion attacks.

Potential Impact

For European organizations, the primary impact of CVE-2025-6203 is the potential denial of service of HashiCorp Vault servers, which can disrupt access to critical secrets and credentials necessary for secure operations. This can halt automated deployment pipelines, cloud infrastructure provisioning, and application authentication processes that depend on Vault, leading to operational downtime and increased risk exposure. Since Vault is integral to many DevOps and cloud-native environments, unavailability can cascade into broader service outages or security lapses. The vulnerability does not compromise data confidentiality or integrity but severely affects availability, which is critical for business continuity. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely heavily on Vault for secrets management may face significant operational and reputational risks. Additionally, the lack of authentication requirement for exploitation increases the risk of opportunistic attacks from external threat actors. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit techniques may emerge. European entities with automated security compliance and auditing processes dependent on Vault’s availability are particularly vulnerable to disruptions caused by this flaw.

Mitigation Recommendations

1. Immediate patching: Upgrade all affected Vault instances to the fixed versions—Community Edition 1.20.3 or Enterprise Editions 1.20.3, 1.19.9, 1.18.14, or 1.16.25. 2. Implement resource monitoring: Deploy monitoring tools to track CPU and memory usage of Vault servers in real time to detect abnormal spikes indicative of exploitation attempts. 3. Configure request throttling: Where possible, apply rate limiting or throttling on incoming Vault requests to prevent resource exhaustion from complex payloads. 4. Network segmentation: Restrict Vault access to trusted networks and clients to reduce exposure to unauthenticated remote attacks. 5. Audit logging and alerting: Enhance audit log monitoring to detect unusual request patterns or timeouts in Vault’s auditing subroutine. 6. Incident response readiness: Prepare response plans for potential Vault unavailability, including fallback secrets management or manual overrides. 7. Vendor communication: Stay updated with HashiCorp advisories for any additional patches or mitigations. 8. Test patches in staging environments before production deployment to ensure stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HashiCorp
Date Reserved
2025-06-17T13:39:36.506Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b0b26aad5a09ad006f2b42

Added to database: 8/28/2025, 7:47:54 PM

Last enriched: 10/23/2025, 6:44:50 PM

Last updated: 11/30/2025, 4:30:22 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats