Impact
The vulnerability allows an attacker to potentially elevate privileges by exploiting the Endpoint Privilege Manager Agent’s elevation dialogs. The flaw resides in how the Agent processes these dialogs, permitting an unauthorized user to obtain higher privileges than intended. The weakness is classified as unauthorized elevation of privilege, CWE‑269.
Affected Systems
Affected systems are deployments of CyberArk Endpoint Privilege Manager Agent version 25.10.0 and earlier. The issue exists in the Agent software distributed by CyberArk, a Palo Alto Networks company, and impacts any workstation or server running the vulnerable Agent component. No specific patch version is listed in the input, but the vulnerability applies to all releases up to and including 25.10.0.
Risk and Exploitability
The CVSS score of 8.5 indicates high severity, but the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not reported in CISA’s KEV catalog. An attacker would likely need to trick a user into interacting with an elevation dialog or already have local access to abuse the flaw, as the input does not explicitly describe the attack vector. Organizations that mitigate the flaw should promptly apply the latest Agent release and review privilege elevation practices.
OpenCVE Enrichment