Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use.
This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. | |
Title | Lack of rate-limiting in password change mechanism in CyberArk Endpoint Privilege Manager | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-02-28T12:33:41.107Z
Updated: 2025-03-05T15:53:23.083Z
Reserved: 2025-01-02T13:12:19.642Z
Link: CVE-2025-22273

Updated: 2025-02-28T13:02:45.419Z

Status : Awaiting Analysis
Published: 2025-02-28T13:15:27.927
Modified: 2025-03-05T16:15:38.140
Link: CVE-2025-22273

No data.