11 results (0.009 seconds)

CVSS: 2.0EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2025 — It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2025 — Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2025 — In the "/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg" endpoint, it is possible to inject code in the "modalDlgMsgInternal" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the required additional bypassing the Content-Security-Policy policy This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2025 — The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwarded-For" header. Thus, the action logging mechanism in the application loses accountability This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwa... • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2025 — An attacker with access to the Administration panel, specifically the "Role Management" tab, can inject code by adding a new role in the "name" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the required additional error that allows bypassing the Content-Security-Policy policy, which mitigates JS code execution while still allowing HTML injection. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is un... • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

15 Jan 2022 — CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20 allows a local user to gain elevated privileges via a Trojan horse Procmon64.exe in the user's Temp directory. CyberArk Endpoint Privilege Manager (EPM) versiones hasta 11.5.3.328 anteriores a 20-12-2021, permite a un usuario local alcanzar privilegios elevados por medio de un troyano Procmon64.exe en el directorio Temp del usuario • https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM-onprem/Latest/en/Content/Release%20Notes/RN-WhatsNew.htm • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

27 Nov 2020 — CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database. CyberArk Endpoint Privilege Manager (EPM) versión 11.1.0.173, permite a atacantes omitir un mecanismo de protección contra robo de credenciales inyectando una DLL en un proceso que normalmente presenta acceso de credenciales, tal y como un proceso d... • https://gist.github.com/inc0d3/47294c1e73ef8cbdc098e739d086efbc • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 5

09 Apr 2019 — CyberArk Endpoint Privilege Manager 10.2.1.603 and earlier allows an attacker (who is able to edit permissions of a file) to bypass intended access restrictions and execute blocked applications. CyberArk Endpoint Privilege Manager 10.2.1.603 y anteriores permite a un atacantes (capaz de editar los permisos de un fichero) eludir las restricciones de acceso previstas y ejecutar aplicaciones bloqueadas. CyberArk EPM version 10.2.1.603 suffers from a security restrictions bypass vulnerability. • https://packetstorm.news/files/id/152489 • CWE-269: Improper Privilege Management •

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 0

08 Mar 2019 — A buffer overflow in the kernel driver CybKernelTracker.sys in CyberArk Endpoint Privilege Manager versions prior to 10.7 allows an attacker (without Administrator privileges) to escalate privileges or crash the machine by loading an image, such as a DLL, with a long path. Un desbordamiento de búfer en el controlador del kernel CybKernelTracker.sys en CyberArk Endpoint Privilege Manager, en versiones anteriores a la 10.7, permite a un atacante (sin permisos del administrador) escalar privilegios o cerrar la... • http://www.securityfocus.com/bid/107387 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

05 Jul 2018 — In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process that executes as Admin. En CyberArk Endpoint Privilege Manager (anteriormente Viewfinity), es posible el escalado de privilegios si el atacante tiene un proceso que se ejecuta como Admin. • https://www.youtube.com/watch?v=xYRbXBPubaw •