Cyberark

Endpoint Privilege Manager

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 25.02.2026 01:33:05
  • Zuletzt bearbeitet 27.02.2026 18:58:08

CyberArk Endpoint Privilege Manager Agent versions 25.10.0 and lower allow potential unauthorized privilege elevation leveraging CyberArk elevation dialogs

  • EPSS 0.01%
  • Veröffentlicht 03.02.2026 00:00:00
  • Zuletzt bearbeitet 28.02.2026 04:16:17

CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to achieve privilege escalation through policy elevation of an Administration task.

  • EPSS 0.15%
  • Veröffentlicht 28.02.2025 13:15:28
  • Zuletzt bearbeitet 15.04.2026 00:35:42

It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After m...

  • EPSS 0.17%
  • Veröffentlicht 28.02.2025 13:15:27
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An attacker with access to the Administration panel, specifically the "Role Management" tab, can inject code by adding a new role in the "name" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the requir...

  • EPSS 0.13%
  • Veröffentlicht 28.02.2025 13:15:27
  • Zuletzt bearbeitet 15.04.2026 00:35:42

The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwarded-For" header. Thus, the action logging mechanism in the application loses accountability This issue affects CyberArk Endpoint Privile...

  • EPSS 0.18%
  • Veröffentlicht 28.02.2025 13:15:27
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the "/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg" endpoint, it is possible to inject code in the "modalDlgMsgInternal" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the requ...

  • EPSS 0.22%
  • Veröffentlicht 28.02.2025 13:15:27
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 15.01.2022 15:15:19
  • Zuletzt bearbeitet 21.11.2024 06:30:17

CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20 allows a local user to gain elevated privileges via a Trojan horse Procmon64.exe in the user's Temp directory.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 27.11.2020 06:15:11
  • Zuletzt bearbeitet 21.11.2024 05:18:37

CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLi...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 09.04.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:02

CyberArk Endpoint Privilege Manager 10.2.1.603 and earlier allows an attacker (who is able to edit permissions of a file) to bypass intended access restrictions and execute blocked applications.