
CVE-2024-42337 – CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
https://notcve.org/view.php?id=CVE-2024-42337
25 Aug 2024 — CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor • https://www.gov.il/en/Departments/faq/cve_advisories • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-11197 – CyberArk Viewfinity 5.5.10.95 - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2017-11197
03 May 2023 — In CyberArk Viewfinity 5.5.10.95 and 6.x before 6.1.1.220, a low privilege user can escalate to an administrative user via a bug within the "add printer" option. • https://www.exploit-db.com/exploits/42319 •

CVE-2022-22700
https://notcve.org/view.php?id=CVE-2022-22700
03 Mar 2022 — CyberArk Identity versions up to and including 22.1 in the 'StartAuthentication' resource, exposes the response header 'X-CFY-TX-TM'. In certain configurations, that response header contains different, predictable value ranges which can be used to determine whether a user exists in the tenant. CyberArk Identity versiones hasta la 22.1 incluyéndola, en el recurso "StartAuthentication", exponen el encabezado de respuesta "X-CFY-TX-TM". En determinadas configuraciones, ese encabezado de respuesta contiene dife... • https://docs.cyberark.com/Product-Doc/OnlineHelp/Idaptive/Latest/en/Content/ReleaseNotes/ReleaseNotes-Latest.htm • CWE-330: Use of Insufficiently Random Values •

CVE-2021-44049
https://notcve.org/view.php?id=CVE-2021-44049
15 Jan 2022 — CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20 allows a local user to gain elevated privileges via a Trojan horse Procmon64.exe in the user's Temp directory. CyberArk Endpoint Privilege Manager (EPM) versiones hasta 11.5.3.328 anteriores a 20-12-2021, permite a un usuario local alcanzar privilegios elevados por medio de un troyano Procmon64.exe en el directorio Temp del usuario • https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM-onprem/Latest/en/Content/Release%20Notes/RN-WhatsNew.htm • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2021-31798 – CyberArk Credential Provider Local Cache Decryption
https://notcve.org/view.php?id=CVE-2021-31798
02 Sep 2021 — The effective key space used to encrypt the cache in CyberArk Credential Provider prior to 12.1 has low entropy, and under certain conditions a local malicious user can obtain the plaintext of cache files. El espacio de claves efectivo usado para cifrar la caché en CyberArk Credential Provider versiones anteriores a 12.1, presenta una entropía baja, y en determinadas condiciones un usuario local malicioso puede obtener el texto plano de los archivos de la caché CyberArk Credential Providers can be configure... • http://packetstormsecurity.com/files/164035/CyberArk-Credential-Provider-Local-Cache-Decryption.html • CWE-331: Insufficient Entropy •

CVE-2021-31796 – CyberArk Credential File Insufficient Effective Key Space
https://notcve.org/view.php?id=CVE-2021-31796
02 Sep 2021 — An inadequate encryption vulnerability discovered in CyberArk Credential Provider before 12.1 may lead to Information Disclosure. An attacker may realistically have enough information that the number of possible keys (for a credential file) is only one, and the number is usually not higher than 2^36. Una vulnerabilidad de cifrado inadecuado detectada en CyberArk Credential Provider versiones anteriores a 12.1, puede conllevar a una Divulgación de Información. Un atacante puede tener, de forma realista, sufi... • https://github.com/unmanarc/CACredDecoder • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVE-2021-31797 – CyberArk Credential Provider Race Condition / Authorization Bypass
https://notcve.org/view.php?id=CVE-2021-31797
01 Sep 2021 — The user identification mechanism used by CyberArk Credential Provider prior to 12.1 is susceptible to a local host race condition, leading to password disclosure. El mecanismo de identificación de usuarios usado por CyberArk Credential Provider versiones anteriores a 12.1, es susceptible a una condición de carrera del host local, conllevando a una divulgación de contraseña CyberArk's Credential Provider loopback communications on TCP port 18923 are encrypted with key material that has extremely low entropy... • https://packetstorm.news/files/id/164033 • CWE-331: Insufficient Entropy CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2021-37151
https://notcve.org/view.php?id=CVE-2021-37151
01 Sep 2021 — CyberArk Identity 21.5.131, when handling an invalid authentication attempt, sometimes reveals whether the username is valid. In certain authentication policy configurations with MFA, the API response length can be used to differentiate between a valid user and an invalid one (aka Username Enumeration). Response differentiation enables attackers to enumerate usernames of valid application users. Attackers can use this information to leverage brute-force and dictionary attacks in order to discover valid acco... • https://www.cyberark.com/products • CWE-203: Observable Discrepancy •

CVE-2020-25738
https://notcve.org/view.php?id=CVE-2020-25738
27 Nov 2020 — CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database. CyberArk Endpoint Privilege Manager (EPM) versión 11.1.0.173, permite a atacantes omitir un mecanismo de protección contra robo de credenciales inyectando una DLL en un proceso que normalmente presenta acceso de credenciales, tal y como un proceso d... • https://gist.github.com/inc0d3/47294c1e73ef8cbdc098e739d086efbc • CWE-427: Uncontrolled Search Path Element •

CVE-2020-25374
https://notcve.org/view.php?id=CVE-2020-25374
28 Oct 2020 — CyberArk Privileged Session Manager (PSM) 10.9.0.15 allows attackers to discover internal pathnames by reading an error popup message after two hours of idle time. CyberArk Privileged Session Manager (PSM) versión 10.9.0.15, permite a atacantes detectar rutas de acceso internas mediante la lectura de un mensaje emergente de error después de dos horas de inactividad • https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20SysReq/System%20Requirements%20-%20PSM.htm • CWE-613: Insufficient Session Expiration •