Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 28 Feb 2025 13:00:00 +0000

Type Values Removed Values Added
Description Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.
Title Lack of rate-limiting in password change mechanism in CyberArk Endpoint Privilege Manager
Weaknesses CWE-770
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-02-28T12:33:41.107Z

Updated: 2025-03-05T15:53:23.083Z

Reserved: 2025-01-02T13:12:19.642Z

Link: CVE-2025-22273

cve-icon Vulnrichment

Updated: 2025-02-28T13:02:45.419Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-28T13:15:27.927

Modified: 2025-03-05T16:15:38.140

Link: CVE-2025-22273

cve-icon Redhat

No data.