First published: Fri Feb 28 2025(Updated: )
Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.
Credit: cvd@cert.pl
Affected Software | Affected Version | How to fix |
---|---|---|
CyberArk Endpoint Privilege Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22273 is considered a critical vulnerability due to its potential for enabling brute force attacks on user passwords.
To fix CVE-2025-22273, implement rate limiting on user interaction requests at the /EPMUI/VfManager.asmx/ChangePassword endpoint.
CVE-2025-22273 affects CyberArk Endpoint Privilege Manager.
CVE-2025-22273 allows attackers to conduct brute force password attacks due to a lack of limitations on request frequency.
Currently, there are no specific workarounds for CVE-2025-22273, but applying security best practices for password management is recommended.