Cyberark

Endpoint Privilege Manager

11 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Published 28.02.2025 13:15:28
  • Last modified 05.03.2025 16:15:38

It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After m...

  • EPSS 0.31%
  • Published 28.02.2025 13:15:27
  • Last modified 05.03.2025 16:15:37

An attacker with access to the Administration panel, specifically the "Role Management" tab, can inject code by adding a new role in the "name" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the requir...

  • EPSS 0.1%
  • Published 28.02.2025 13:15:27
  • Last modified 05.03.2025 16:15:37

The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwarded-For" header. Thus, the action logging mechanism in the application loses accountability This issue affects CyberArk Endpoint Privile...

  • EPSS 0.15%
  • Published 28.02.2025 13:15:27
  • Last modified 05.03.2025 16:15:38

In the "/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg" endpoint, it is possible to inject code in the "modalDlgMsgInternal" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the requ...

  • EPSS 0.11%
  • Published 28.02.2025 13:15:27
  • Last modified 05.03.2025 16:15:38

Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. ...

Exploit
  • EPSS 0.05%
  • Published 15.01.2022 15:15:19
  • Last modified 21.11.2024 06:30:17

CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20 allows a local user to gain elevated privileges via a Trojan horse Procmon64.exe in the user's Temp directory.

Exploit
  • EPSS 0.06%
  • Published 27.11.2020 06:15:11
  • Last modified 21.11.2024 05:18:37

CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLi...

Exploit
  • EPSS 0.33%
  • Published 09.04.2019 18:29:00
  • Last modified 21.11.2024 03:50:02

CyberArk Endpoint Privilege Manager 10.2.1.603 and earlier allows an attacker (who is able to edit permissions of a file) to bypass intended access restrictions and execute blocked applications.

  • EPSS 0.06%
  • Published 08.03.2019 19:29:00
  • Last modified 21.11.2024 04:51:59

A buffer overflow in the kernel driver CybKernelTracker.sys in CyberArk Endpoint Privilege Manager versions prior to 10.7 allows an attacker (without Administrator privileges) to escalate privileges or crash the machine by loading an image, such as a...

  • EPSS 0.43%
  • Published 05.07.2018 20:29:00
  • Last modified 21.11.2024 03:46:18

In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process that executes as Admin.