The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-3462

CVE-2023-3462: HashiCorp Vault Auth Bypass Vulnerability

CVE-2023-3462 is an authentication bypass flaw in HashiCorp Vault that enables user enumeration via LDAP auth method. Attackers can identify valid accounts by analyzing server responses. Fixed in versions 1.14.1 and 1.13.5.

Published: February 11, 2026

CVE-2023-3462 Overview

HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP authentication method. An attacker may submit requests for existent and non-existent LDAP users and observe the response from Vault to determine if the account is valid on the LDAP server. This information disclosure vulnerability allows attackers to enumerate valid usernames, which can be leveraged for subsequent attacks such as password spraying or targeted phishing campaigns.

Critical Impact

Attackers can enumerate valid LDAP user accounts through observable response differences, enabling reconnaissance for credential-based attacks against HashiCorp Vault deployments.

Affected Products

  • HashiCorp Vault (all versions prior to 1.13.5)
  • HashiCorp Vault Enterprise (all versions prior to 1.13.5)
  • HashiCorp Vault 1.14.0 (both Community and Enterprise editions)

Discovery Timeline

  • 2023-07-31 - CVE-2023-3462 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2023-3462

Vulnerability Analysis

This vulnerability falls under CWE-203 (Observable Discrepancy), where the application exposes sensitive information through differences in behavior or response characteristics. When LDAP authentication is configured in Vault, the system produces distinguishable responses when processing authentication requests for valid versus invalid usernames.

The attack is network-accessible, requires no authentication or user interaction, and has low complexity to execute. While the vulnerability does not directly compromise confidentiality of stored secrets or system integrity, it exposes information about valid user accounts that exists within the connected LDAP directory.

Root Cause

The root cause lies in the LDAP authentication method's response handling logic. When an attacker submits authentication requests, Vault returns different response patterns depending on whether the username exists in the LDAP directory. These observable differences—which may include variations in error messages, response timing, or HTTP status codes—allow attackers to distinguish between valid and invalid accounts without needing valid credentials.

Attack Vector

The attack is conducted over the network against Vault's authentication endpoint. An attacker systematically submits authentication requests using a list of potential usernames. By analyzing the responses, the attacker can build a list of valid LDAP accounts. This enumerated user list can then be used for:

  • Password spraying attacks against the Vault LDAP auth endpoint
  • Credential stuffing using leaked password databases
  • Social engineering campaigns targeting identified users
  • Lateral movement attempts within the organization

The attack requires no prior authentication and can be automated to enumerate large user lists quickly.

Detection Methods for CVE-2023-3462

Indicators of Compromise

  • High volume of failed authentication attempts against the LDAP auth method from single or distributed IP addresses
  • Sequential or dictionary-based username patterns in authentication logs
  • Unusually rapid authentication requests suggesting automated enumeration
  • Authentication attempts using usernames not typically associated with Vault access

Detection Strategies

  • Monitor Vault audit logs for patterns of repeated authentication failures with different usernames from the same source
  • Implement rate limiting detection to identify high-frequency authentication attempts
  • Correlate Vault authentication logs with LDAP server logs to identify enumeration patterns
  • Deploy network-based detection for high volumes of traffic to the /v1/auth/ldap/login/ endpoint

Monitoring Recommendations

  • Enable and centralize Vault audit logging to capture all authentication events
  • Configure alerting thresholds for authentication failure rates that exceed normal baselines
  • Implement SIEM rules to correlate authentication patterns across multiple security data sources
  • Monitor for reconnaissance activity preceding credential-based attacks against Vault

How to Mitigate CVE-2023-3462

Immediate Actions Required

  • Upgrade HashiCorp Vault to version 1.14.1 or later
  • Upgrade HashiCorp Vault to version 1.13.5 or later if on the 1.13.x branch
  • Review audit logs for signs of prior user enumeration attempts
  • Implement network-level rate limiting on Vault authentication endpoints

Patch Information

HashiCorp has addressed this vulnerability in Vault versions 1.14.1 and 1.13.5. The fix normalizes the authentication response behavior to prevent attackers from distinguishing between valid and invalid usernames. Organizations should upgrade to these patched versions as soon as possible. For detailed information, refer to the HashiCorp Security Advisory HCSEC-2023-24.

Workarounds

  • Implement network-level controls to restrict access to Vault's LDAP authentication endpoint to trusted networks only
  • Deploy a Web Application Firewall (WAF) or API gateway with rate limiting capabilities in front of Vault
  • Consider using alternative authentication methods such as OIDC or JWT tokens if LDAP enumeration risk is unacceptable
  • Implement account lockout policies on the LDAP server to slow enumeration attempts
bash
# Configuration example - Rate limiting using HAProxy in front of Vault
frontend vault_frontend
    bind *:8200
    # Limit to 10 requests per second per IP for LDAP auth endpoint
    stick-table type ip size 100k expire 30s store http_req_rate(10s)
    acl ldap_auth path_beg /v1/auth/ldap/login
    http-request track-sc0 src if ldap_auth
    http-request deny deny_status 429 if ldap_auth { sc_http_req_rate(0) gt 100 }
    default_backend vault_backend

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechHashicorp Vault

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability1.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-203
  • Vendor Resources
  • HashiCorp Discussion on User Enumeration
  • Related CVEs
  • CVE-2024-7594: HashiCorp Vault Auth Bypass Vulnerability

  • CVE-2025-4166: HashiCorp Vault Information Disclosure Bug

  • CVE-2025-6203: HashiCorp Vault DoS Vulnerability

  • CVE-2025-6000: HashiCorp Vault RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English