<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kvv2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/kvv2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 04:16:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/kvv2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Vault kvv2 Policy Bypass Vulnerability Leading to Denial-of-Service (CVE-2026-3605)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vault-kvv2-dos/</link><pubDate>Fri, 17 Apr 2026 04:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vault-kvv2-dos/</guid><description>An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service, addressed in Vault versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.</description><content:encoded><![CDATA[<p>CVE-2026-3605 is a vulnerability in HashiCorp Vault&rsquo;s kvv2 secrets engine where an authenticated user can delete secrets they lack read/write authorization for, leading to a denial-of-service. This occurs when a policy associated with the user contains a glob allowing access to a kvv2 path. The vulnerability does <em>not</em> permit cross-namespace secret deletion or unauthorized data reading. This issue impacts Vault Community Edition and Vault Enterprise. Affected versions include all releases prior to the fixes in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16. Successful exploitation allows an attacker to disrupt applications relying on the deleted secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid credentials for a Vault user account.</li>
<li>The attacker identifies a kvv2 secrets path protected by a policy containing a glob (e.g., <code>secret/data/*</code>).</li>
<li>The attacker authenticates to Vault using their credentials via the Vault CLI or API (<code>vault login -method=...</code>).</li>
<li>The attacker uses the Vault CLI or API to attempt to delete a secret within the globbed path (<code>vault kv delete secret/data/unauthorized-secret</code>).</li>
<li>Due to the policy misconfiguration, the delete operation succeeds, even though the attacker lacks explicit read or write permissions for the specific secret.</li>
<li>The target secret is removed from the Vault backend.</li>
<li>Applications or services relying on the deleted secret experience failures or unexpected behavior.</li>
<li>Repeated secret deletion leads to widespread application disruption, resulting in a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3605 allows an authenticated user to cause a denial-of-service by deleting secrets they are not authorized to manage. While the vulnerability does not allow unauthorized data access or cross-namespace deletion, the impact can be significant for organizations relying on Vault for secrets management. The number of affected systems depends on the scope of the vulnerable policy and the attacker&rsquo;s access. The primary impact is application downtime and potential data loss due to deleted secrets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vault Community Edition and Vault Enterprise to versions 2.0.0, 1.21.5, 1.20.10, or 1.19.16 to patch CVE-2026-3605.</li>
<li>Review and revise Vault policies containing globs (<code>secret/data/*</code>) to ensure appropriate least-privilege access control and prevent unauthorized deletion, referencing the vulnerability description in this brief.</li>
<li>Monitor Vault audit logs for <code>secret/delete</code> operations performed by users with policies containing broad globs, using the provided Sigma rule for guidance.</li>
<li>Implement regular backups of Vault secrets to mitigate the impact of accidental or malicious deletion, in case this vulnerability is exploited.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vault</category><category>kvv2</category><category>denial-of-service</category><category>cve-2026-3605</category></item></channel></rss>