Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-6013 (GCVE-0-2025-6013)
Vulnerability from cvelistv5 – Published: 2025-08-06 10:06 – Updated: 2025-08-07 03:55
VLAI?
EPSS
Summary
Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.
Severity ?
6.5 (Medium)
CWE
- CWE-156 - Improper Neutralization of Whitespace
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| HashiCorp | Vault |
Affected:
1.10.0 , < 1.20.2
(semver)
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6013",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-06T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-07T03:55:18.996Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"64 bit",
"32 bit",
"x86",
"ARM",
"MacOS",
"Windows",
"Linux"
],
"product": "Vault",
"repo": "https://github.com/hashicorp/vault",
"vendor": "HashiCorp",
"versions": [
{
"lessThan": "1.20.2",
"status": "affected",
"version": "1.10.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"64 bit",
"32 bit",
"x86",
"ARM",
"MacOS",
"Windows",
"Linux"
],
"product": "Vault Enterprise",
"repo": "https://github.com/hashicorp/vault",
"vendor": "HashiCorp",
"versions": [
{
"changes": [
{
"at": "1.19.8",
"status": "unaffected"
},
{
"at": "1.18.13",
"status": "unaffected"
},
{
"at": "1.16.24",
"status": "unaffected"
}
],
"lessThan": "1.20.2",
"status": "affected",
"version": "1.10.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eVault and Vault Enterprise\u2019s (\u201cVault\u201d) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.\u003c/p\u003e\u003cbr/\u003e"
}
],
"value": "Vault and Vault Enterprise\u2019s (\u201cVault\u201d) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-156",
"description": "CWE-156: Improper Neutralization of Whitespace",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-06T10:06:55.668Z",
"orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
"shortName": "HashiCorp"
},
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092"
}
],
"source": {
"advisory": "HCSEC-2025-20",
"discovery": "EXTERNAL"
},
"title": "Vault LDAP MFA Enforcement Bypass When Using Username As Alias"
}
},
"cveMetadata": {
"assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
"assignerShortName": "HashiCorp",
"cveId": "CVE-2025-6013",
"datePublished": "2025-08-06T10:06:55.668Z",
"dateReserved": "2025-06-11T19:00:51.574Z",
"dateUpdated": "2025-08-07T03:55:18.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6013\",\"sourceIdentifier\":\"security@hashicorp.com\",\"published\":\"2025-08-06T10:15:35.423\",\"lastModified\":\"2025-08-06T20:23:37.600\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vault and Vault Enterprise\u2019s (\u201cVault\u201d) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.\"},{\"lang\":\"es\",\"value\":\"Es posible que el m\u00e9todo de autenticaci\u00f3n LDAP de Vault y Vault Enterprise (Vault) no haya aplicado correctamente la MFA si `username_as_alias` se configur\u00f3 como `true` y un usuario ten\u00eda varios CN iguales, pero con espacios al principio o al final. Corregido en Vault Community Edition 1.20.2 y Vault Enterprise 1.20.2, 1.19.8, 1.18.13 y 1.16.24.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@hashicorp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security@hashicorp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-156\"}]}],\"references\":[{\"url\":\"https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092\",\"source\":\"security@hashicorp.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6013\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-06T13:25:32.915083Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-06T13:25:36.069Z\"}}], \"cna\": {\"title\": \"Vault LDAP MFA Enforcement Bypass When Using Username As Alias\", \"source\": {\"advisory\": \"HCSEC-2025-20\", \"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-180\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/hashicorp/vault\", \"vendor\": \"HashiCorp\", \"product\": \"Vault\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.10.0\", \"lessThan\": \"1.20.2\", \"versionType\": \"semver\"}], \"platforms\": [\"64 bit\", \"32 bit\", \"x86\", \"ARM\", \"MacOS\", \"Windows\", \"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://github.com/hashicorp/vault\", \"vendor\": \"HashiCorp\", \"product\": \"Vault Enterprise\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"1.19.8\", \"status\": \"unaffected\"}, {\"at\": \"1.18.13\", \"status\": \"unaffected\"}, {\"at\": \"1.16.24\", \"status\": \"unaffected\"}], \"version\": \"1.10.0\", \"lessThan\": \"1.20.2\", \"versionType\": \"semver\"}], \"platforms\": [\"64 bit\", \"32 bit\", \"x86\", \"ARM\", \"MacOS\", \"Windows\", \"Linux\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vault and Vault Enterprise\\u2019s (\\u201cVault\\u201d) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eVault and Vault Enterprise\\u2019s (\\u201cVault\\u201d) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.\u003c/p\u003e\u003cbr/\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-156\", \"description\": \"CWE-156: Improper Neutralization of Whitespace\"}]}], \"providerMetadata\": {\"orgId\": \"67fedba0-ff2e-4543-ba5b-aa93e87718cc\", \"shortName\": \"HashiCorp\", \"dateUpdated\": \"2025-08-06T10:06:55.668Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6013\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-07T03:55:18.996Z\", \"dateReserved\": \"2025-06-11T19:00:51.574Z\", \"assignerOrgId\": \"67fedba0-ff2e-4543-ba5b-aa93e87718cc\", \"datePublished\": \"2025-08-06T10:06:55.668Z\", \"assignerShortName\": \"HashiCorp\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
OPENSUSE-SU-2025:15461-1
Vulnerability from csaf_opensuse - Published: 2025-08-18 00:00 - Updated: 2025-08-18 00:00Summary
openbao-2.3.2-1.1 on GA media
Notes
Title of the patch
openbao-2.3.2-1.1 on GA media
Description of the patch
These are all security issues fixed in the openbao-2.3.2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15461
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "openbao-2.3.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the openbao-2.3.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15461",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15461-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54996 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55000 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5999 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6000 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6004 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6010 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6011 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6013 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6014 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6015 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6015/"
}
],
"title": "openbao-2.3.2-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-18T00:00:00Z",
"generator": {
"date": "2025-08-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15461-1",
"initial_release_date": "2025-08-18T00:00:00Z",
"revision_history": [
{
"date": "2025-08-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openbao-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-2.3.2-1.1.aarch64",
"product_id": "openbao-2.3.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openbao-agent-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-agent-2.3.2-1.1.aarch64",
"product_id": "openbao-agent-2.3.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"product_id": "openbao-cassandra-database-plugin-2.3.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"product_id": "openbao-influxdb-database-plugin-2.3.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"product_id": "openbao-mysql-database-plugin-2.3.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"product_id": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"product_id": "openbao-postgresql-database-plugin-2.3.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openbao-server-2.3.2-1.1.aarch64",
"product": {
"name": "openbao-server-2.3.2-1.1.aarch64",
"product_id": "openbao-server-2.3.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openbao-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-2.3.2-1.1.ppc64le",
"product_id": "openbao-2.3.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openbao-agent-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-agent-2.3.2-1.1.ppc64le",
"product_id": "openbao-agent-2.3.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"product_id": "openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"product_id": "openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"product_id": "openbao-mysql-database-plugin-2.3.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"product_id": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"product_id": "openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openbao-server-2.3.2-1.1.ppc64le",
"product": {
"name": "openbao-server-2.3.2-1.1.ppc64le",
"product_id": "openbao-server-2.3.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openbao-2.3.2-1.1.s390x",
"product": {
"name": "openbao-2.3.2-1.1.s390x",
"product_id": "openbao-2.3.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openbao-agent-2.3.2-1.1.s390x",
"product": {
"name": "openbao-agent-2.3.2-1.1.s390x",
"product_id": "openbao-agent-2.3.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"product": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"product_id": "openbao-cassandra-database-plugin-2.3.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"product": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"product_id": "openbao-influxdb-database-plugin-2.3.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"product": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"product_id": "openbao-mysql-database-plugin-2.3.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"product": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"product_id": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"product": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"product_id": "openbao-postgresql-database-plugin-2.3.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openbao-server-2.3.2-1.1.s390x",
"product": {
"name": "openbao-server-2.3.2-1.1.s390x",
"product_id": "openbao-server-2.3.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openbao-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-2.3.2-1.1.x86_64",
"product_id": "openbao-2.3.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openbao-agent-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-agent-2.3.2-1.1.x86_64",
"product_id": "openbao-agent-2.3.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"product_id": "openbao-cassandra-database-plugin-2.3.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"product_id": "openbao-influxdb-database-plugin-2.3.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"product_id": "openbao-mysql-database-plugin-2.3.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"product_id": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"product_id": "openbao-postgresql-database-plugin-2.3.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openbao-server-2.3.2-1.1.x86_64",
"product": {
"name": "openbao-server-2.3.2-1.1.x86_64",
"product_id": "openbao-server-2.3.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x"
},
"product_reference": "openbao-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-agent-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-agent-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-agent-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-agent-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-agent-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x"
},
"product_reference": "openbao-agent-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-agent-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-agent-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x"
},
"product_reference": "openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-cassandra-database-plugin-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x"
},
"product_reference": "openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-influxdb-database-plugin-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x"
},
"product_reference": "openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-database-plugin-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x"
},
"product_reference": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x"
},
"product_reference": "openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-postgresql-database-plugin-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-server-2.3.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64"
},
"product_reference": "openbao-server-2.3.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-server-2.3.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le"
},
"product_reference": "openbao-server-2.3.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-server-2.3.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x"
},
"product_reference": "openbao-server-2.3.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openbao-server-2.3.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
},
"product_reference": "openbao-server-2.3.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-54996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54996"
}
],
"notes": [
{
"category": "general",
"text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, accounts with access to highly-privileged identity entity systems in root namespaces were able to increase their scope directly to the root policy. While the identity system allowed adding arbitrary policies, which in turn could contain capability grants on arbitrary paths, the root policy was restricted to manual generation using unseal or recovery key shares. The global root policy was not accessible from child namespaces. This issue is fixed in version 2.3.2. To workaround this vulnerability, use of denied_parameters in any policy which has access to the affected identity endpoints (on identity entities) may be sufficient to prohibit this type of attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54996",
"url": "https://www.suse.com/security/cve/CVE-2025-54996"
},
{
"category": "external",
"summary": "SUSE Bug 1247888 for CVE-2025-54996",
"url": "https://bugzilla.suse.com/1247888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54996"
},
{
"cve": "CVE-2025-55000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55000"
}
],
"notes": [
{
"category": "general",
"text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, OpenBao\u0027s TOTP secrets engine could accept valid codes multiple times rather than strictly-once. This was caused by unexpected normalization in the underlying TOTP library. To work around, ensure that all codes are first normalized before submitting to the OpenBao endpoint. TOTP code verification is a privileged action; only trusted systems should be verifying codes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55000",
"url": "https://www.suse.com/security/cve/CVE-2025-55000"
},
{
"category": "external",
"summary": "SUSE Bug 1247892 for CVE-2025-55000",
"url": "https://bugzilla.suse.com/1247892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55000"
},
{
"cve": "CVE-2025-55003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55003"
}
],
"notes": [
{
"category": "general",
"text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao\u0027s Login Multi-Factor Authentication (MFA) system allows enforcing MFA using Time-based One Time Password (TOTP). Due to normalization applied by the underlying TOTP library, codes were accepted which could contain whitespace; this whitespace could bypass internal rate limiting of the MFA method and allow reuse of existing MFA codes. This issue was fixed in version 2.3.2. To work around this, use of rate-limiting quotas can limit an attacker\u0027s ability to exploit this: https://openbao.org/api-docs/system/rate-limit-quotas/.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55003",
"url": "https://www.suse.com/security/cve/CVE-2025-55003"
},
{
"category": "external",
"summary": "SUSE Bug 1247894 for CVE-2025-55003",
"url": "https://bugzilla.suse.com/1247894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55003"
},
{
"cve": "CVE-2025-5999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5999"
}
],
"notes": [
{
"category": "general",
"text": "A privileged Vault operator with write permissions to the root namespace\u0027s identity endpoint could escalate their own or another user\u0027s token privileges to Vault\u0027s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5999",
"url": "https://www.suse.com/security/cve/CVE-2025-5999"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-5999"
},
{
"cve": "CVE-2025-6000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6000"
}
],
"notes": [
{
"category": "general",
"text": "A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault\u0027s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6000",
"url": "https://www.suse.com/security/cve/CVE-2025-6000"
},
{
"category": "external",
"summary": "SUSE Bug 1247546 for CVE-2025-6000",
"url": "https://bugzilla.suse.com/1247546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-6000"
},
{
"cve": "CVE-2025-6004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6004"
}
],
"notes": [
{
"category": "general",
"text": "Vault and Vault Enterprise\u0027s (\"Vault\") user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6004",
"url": "https://www.suse.com/security/cve/CVE-2025-6004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6004"
},
{
"cve": "CVE-2025-6010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6010"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6010",
"url": "https://www.suse.com/security/cve/CVE-2025-6010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6010"
},
{
"cve": "CVE-2025-6011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6011"
}
],
"notes": [
{
"category": "general",
"text": "A timing side channel in Vault and Vault Enterprise\u0027s (\"Vault\") userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault\u0027s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6011",
"url": "https://www.suse.com/security/cve/CVE-2025-6011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-6011"
},
{
"cve": "CVE-2025-6013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6013"
}
],
"notes": [
{
"category": "general",
"text": "Vault and Vault Enterprise\u0027s (\"Vault\") ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6013",
"url": "https://www.suse.com/security/cve/CVE-2025-6013"
},
{
"category": "external",
"summary": "SUSE Bug 1247698 for CVE-2025-6013",
"url": "https://bugzilla.suse.com/1247698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6013"
},
{
"cve": "CVE-2025-6014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6014"
}
],
"notes": [
{
"category": "general",
"text": "Vault and Vault Enterprise\u0027s (\"Vault\") TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6014",
"url": "https://www.suse.com/security/cve/CVE-2025-6014"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6014"
},
{
"cve": "CVE-2025-6015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6015"
}
],
"notes": [
{
"category": "general",
"text": "Vault and Vault Enterprise\u0027s (\"Vault\") login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6015",
"url": "https://www.suse.com/security/cve/CVE-2025-6015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openbao-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-agent-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1.x86_64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.aarch64",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.ppc64le",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.s390x",
"openSUSE Tumbleweed:openbao-server-2.3.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6015"
}
]
}
GHSA-7RX2-769V-HRWF
Vulnerability from github – Published: 2025-08-06 12:31 – Updated: 2025-08-06 18:14
VLAI?
Summary
HashiCorp Vault ldap auth method may not have correctly enforced MFA
Details
Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.
Severity ?
6.5 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/hashicorp/vault"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-6013"
],
"database_specific": {
"cwe_ids": [
"CWE-156"
],
"github_reviewed": true,
"github_reviewed_at": "2025-08-06T18:14:06Z",
"nvd_published_at": "2025-08-06T10:15:35Z",
"severity": "MODERATE"
},
"details": "Vault and Vault Enterprise\u2019s (\u201cVault\u201d) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.",
"id": "GHSA-7rx2-769v-hrwf",
"modified": "2025-08-06T18:14:06Z",
"published": "2025-08-06T12:31:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6013"
},
{
"type": "WEB",
"url": "https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092"
},
{
"type": "PACKAGE",
"url": "https://github.com/hashicorp/vault"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "HashiCorp Vault ldap auth method may not have correctly enforced MFA"
}
FKIE_CVE-2025-6013
Vulnerability from fkie_nvd - Published: 2025-08-06 10:15 - Updated: 2025-08-06 20:23
Severity ?
Summary
Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vault and Vault Enterprise\u2019s (\u201cVault\u201d) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24."
},
{
"lang": "es",
"value": "Es posible que el m\u00e9todo de autenticaci\u00f3n LDAP de Vault y Vault Enterprise (Vault) no haya aplicado correctamente la MFA si `username_as_alias` se configur\u00f3 como `true` y un usuario ten\u00eda varios CN iguales, pero con espacios al principio o al final. Corregido en Vault Community Edition 1.20.2 y Vault Enterprise 1.20.2, 1.19.8, 1.18.13 y 1.16.24."
}
],
"id": "CVE-2025-6013",
"lastModified": "2025-08-06T20:23:37.600",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2,
"source": "security@hashicorp.com",
"type": "Secondary"
}
]
},
"published": "2025-08-06T10:15:35.423",
"references": [
{
"source": "security@hashicorp.com",
"url": "https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092"
}
],
"sourceIdentifier": "security@hashicorp.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-156"
}
],
"source": "security@hashicorp.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…