This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5961 | Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 28 Feb 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. | |
| Title | Lack of rate-limiting in password change mechanism in CyberArk Endpoint Privilege Manager | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-03-05T15:53:23.083Z
Reserved: 2025-01-02T13:12:19.642Z
Link: CVE-2025-22273
Updated: 2025-02-28T13:02:45.419Z
Status : Awaiting Analysis
Published: 2025-02-28T13:15:27.927
Modified: 2025-03-05T16:15:38.140
Link: CVE-2025-22273
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:20Z
EUVD