Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. Fixed in Vault Community Edition 1.19.1 and Vault Enterprise 1.19.1, 1.18.7, 1.17.14, 1.16.18.
Metrics
Affected Vendors & Products
References
History
Mon, 05 May 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 02 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 02 May 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. Fixed in Vault Community Edition 1.19.1 and Vault Enterprise 1.19.1, 1.18.7, 1.17.14, 1.16.18. | |
Title | Vault’s Azure Authentication Method bound_location Restriction Could be Bypassed on Login | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: HashiCorp
Published: 2025-05-02T16:15:10.650Z
Updated: 2025-05-02T16:50:15.195Z
Reserved: 2025-04-22T17:52:28.596Z
Link: CVE-2025-3879

Updated: 2025-05-02T16:50:09.297Z

Status : Awaiting Analysis
Published: 2025-05-02T17:15:51.273
Modified: 2025-05-05T20:54:19.760
Link: CVE-2025-3879
