Meet us at Black Hat USA 2025, Booth 6316 or Book a meeting

A Coordinated Disclosure by Cyata

Vaults are the backbone of enterprise trust. They secure the identities of all your users: humans, NHI, and now AI agents. But what happens when the vault itself becomes the vulnerability

Why Vaults Matter
– The Assumption

Enterprise vaults are a core element of identity and access. They store and protect credentials, tokens, certificates, and API keys – the secrets that secure your infrastructure and safeguard your most critical business assets. They shield the identifiers of all identities: human users, NHI and now AI agents.

They’re trusted by default, assumed to be secure by design.

Trusting the vault may be the riskiest assumption of all.

At Cyata, we challenge these assumptions. We think differently.
We challenge the models and trust boundaries that most systems take for granted. Vault Fault is a result of that thinking. Our research shows:

What we uncovered
– and how dangerous it is 

Cyata researchers investigated real-world deployments of leading enterprise vaults including on-premises, cloud-hosted, and SaaS-based vaults, and found 14 high-severity zero-day weaknesses with catastrophic implications.

Among the findings were remote code execution (RCE) vulnerabilities in CyberArk Conjur and HashiCorp Vault that allow a full-blown takeover of the vault in some cases without any valid credentials.

Additional discoveries include – authentication bypasses, impersonation, privilege escalation bugs, code execution pathways, and root token theft.

Cyata disclosed these findings responsibly, coordinating with the vendors to issue CVEs and ensure patches were issued before public release. Our research was selected for presentation at Black Hat USA 2025.

Come Visit us at our Booth at BlackHat – Booth 6316 in the Startup City

List of published CVEs 

HashiCorp Vault

CyberArk Conjur

  • CVE-2025-49827 (CVSS 9.1)

    Bypass of IAM Authenticator in Secrets Manager

  • CVE-2025-49831 (CVSS 9.1)

    IAM Authenticator Bypass via Mis-configured Network Device in Secrets Manager

  • CVE-2025-49828 (CVSS 8.6)

    Remote Code Execution in Secrets Manager

  • CVE-2025-49830 (CVSS 7.1)

    Path traversal and file disclosure in Secrets Manager

  • CVE-2025-49829 (CVSS 6.0)

    Missing validations in Secrets Manager, Self-Hosted

Patches are now available from
HashiCorp and CyberArk

Make sure your systems are updated with the latest versions.

A compromised vault doesn’t stop at secrets –
it breaks your identity foundations.

Total vault takeover

Attackers gain root access to every stored secret – no MFA, no audit trail.

Locking you out

They rotate credentials and disable human, NHI and agentic accounts – you lose control instantly.

Owning identity flows

Authentication, authorization, and logging are hijacked. Your trust model collapses.

Lateral movement

They pivot across environments, escalate privileges, and compromise critical infrastructure.

Your vault might already be compromised. We’ll help you check.

We built a free, offline detection tool that scans for indicators of compromise in your HashiCorp Vault or Conjur deployment.
No agents. No telemetry. Just answers.

What you can do to secure your vault

Immediate

Update to the latest
version

of Vault and Conjur as soon as possible. This is the definitive fix.

Restrict network access

use firewalls, private networking, or proxy layers to limit exposure – especially if you can’t update right away.

Check vendor advisories

Review the latest mitigation guidance from HashiCorp and CyberArk for version-specific recommendations.

Ongoing Hardening

Simulate vault breach scenarios during red team exercises

Limit vault exposure using secure proxies and IP restrictions

Patch vaults proactively and track vendor advisories

Use short-lived, scoped credentials and enforce MFA

Monitor for anomalous vault behavior across CI/CD and cloud layers

Limit root credential use and apply least-privilege policies

Enable and monitor
audit logs 

Stream logs to tamper-resistant SIEMs

Beyond the Vault: A Smarter Layer of Protection

Security and risk management leaders should discover, secure and manage these secrets and whenever possible, 
switch to alternative ‘secretless’ mechanisms.”

Gartner

It’s time to evolve.
The goal is no longer just protecting secrets – it’s minimizing where they live, how long they persist, and how they’re used.

Security isn’t about where secrets live – it’s about who gets to use them, when, and under what context. By shifting from static secrets to dynamic, context-aware access, organizations can reduce risk, simplify controls, and build resilience across hybrid and multi-cloud environments – especially as AI agents and automation reshape the enterprise.

Have questions, thoughts,
or just curious?

We’d love to hear from you.
Talk to the Cyata team – whether you’re exploring a partnership, digging into our tech, or just want to chat about agentic identity.

Meet us live at the Cyata Booth at Black Hat USA
August 6-7, 2025 in Las Vegas – Booth 6316 in the Startup City

Sign up for Cyata’s Newsletter

Get early access, research, and updates from the leaders in Agentic Identity.

By submitting, you agree to our Privacy Policy