Description
Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading sensitive data, creating or deleting resources, and disrupting service operations — via crafted gRPC requests.
Published: 2026-03-17
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via missing authorization checks
Action: Immediate Patch
AI Analysis

Impact

Missing authorization checks on multiple gRPC service endpoints in Devolutions PowerShell Universal before version 2026.1.4 allow an authenticated user with any valid token to bypass role‑based access controls and perform privileged operations—reading sensitive data, creating or deleting resources, and disrupting service operations. Key detail from vendor description: "Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role‑based access controls and perform privileged operations…" These unauthorized operations confer elevated privileges (CWE‑862).

Affected Systems

Affected vendor/product: Devolutions PowerShell Universal. All releases prior to 2026.1.4 are impacted. No more granular version information is provided.

Risk and Exploitability

The CVSS score of 8.3 indicates high severity. The EPSS score of less than 1% suggests a low likelihood of exploitation in the near term, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with a valid token; any token can bypass role‑based controls and trigger privileged gRPC calls, enabling both remote and local attackers that obtain a token to achieve privilege escalation.

Generated by OpenCVE AI on March 19, 2026 at 16:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch to upgrade PowerShell Universal to version 2026.1.4 or later, which includes the missing authorization checks.
  • If a patch cannot be applied immediately, restrict issuance of valid tokens to trusted users only and monitor token usage for anomalous gRPC activity.

Generated by OpenCVE AI on March 19, 2026 at 16:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Missing Authorization Checks in Devolutions PowerShell Universal gRPC Endpoints

Thu, 19 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Ironmansoftware
Ironmansoftware powershell Universal
CPEs cpe:2.3:a:ironmansoftware:powershell_universal:*:*:*:*:*:*:*:*
Vendors & Products Ironmansoftware
Ironmansoftware powershell Universal

Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Devolutions
Devolutions powershell Universal
Vendors & Products Devolutions
Devolutions powershell Universal

Tue, 17 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading sensitive data, creating or deleting resources, and disrupting service operations — via crafted gRPC requests.
Weaknesses CWE-862
References

Subscriptions

Devolutions Powershell Universal
Ironmansoftware Powershell Universal
cve-icon MITRE

Status: PUBLISHED

Assigner: DEVOLUTIONS

Published:

Updated: 2026-03-17T20:03:19.106Z

Reserved: 2026-03-12T17:37:00.624Z

Link: CVE-2026-4064

cve-icon Vulnrichment

Updated: 2026-03-17T20:03:12.507Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T20:16:14.717

Modified: 2026-03-19T13:03:28.320

Link: CVE-2026-4064

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:43Z

Weaknesses