cyberark CVE Vulnerabilities & Metrics

Focus on cyberark vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About cyberark Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with cyberark. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total cyberark CVEs: 17
Earliest CVE date: 12 Apr 2018, 15:29 UTC
Latest CVE date: 25 Aug 2024, 08:15 UTC

Latest CVE reference: CVE-2024-42340

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 300.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 300.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical cyberark CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.61

Max CVSS: 7.7

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 4
7.0-8.9 4
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS cyberark CVEs

These are the five CVEs with the highest CVSS scores for cyberark, sorted by severity first and recency.

All CVEs for cyberark

CVE-2024-42340 cyberark vulnerability CVSS: 0 25 Aug 2024, 08:15 UTC

CyberArk - CWE-602: Client-Side Enforcement of Server-Side Security

CVE-2024-42339 cyberark vulnerability CVSS: 0 25 Aug 2024, 07:15 UTC

CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CVE-2024-42338 cyberark vulnerability CVSS: 0 25 Aug 2024, 07:15 UTC

CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CVE-2024-42337 cyberark vulnerability CVSS: 0 25 Aug 2024, 07:15 UTC

CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CVE-2017-11197 cyberark vulnerability CVSS: 0 03 May 2023, 20:15 UTC

In CyberArk Viewfinity 5.5.10.95 and 6.x before 6.1.1.220, a low privilege user can escalate to an administrative user via a bug within the "add printer" option.

CVE-2022-22700 cyberark vulnerability CVSS: 5.0 03 Mar 2022, 19:15 UTC

CyberArk Identity versions up to and including 22.1 in the 'StartAuthentication' resource, exposes the response header 'X-CFY-TX-TM'. In certain configurations, that response header contains different, predictable value ranges which can be used to determine whether a user exists in the tenant.

CVE-2021-37151 cyberark vulnerability CVSS: 5.0 01 Sep 2021, 13:15 UTC

CyberArk Identity 21.5.131, when handling an invalid authentication attempt, sometimes reveals whether the username is valid. In certain authentication policy configurations with MFA, the API response length can be used to differentiate between a valid user and an invalid one (aka Username Enumeration). Response differentiation enables attackers to enumerate usernames of valid application users. Attackers can use this information to leverage brute-force and dictionary attacks in order to discover valid account information such as passwords.

CVE-2020-25738 cyberark vulnerability CVSS: 1.9 27 Nov 2020, 06:15 UTC

CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database.

CVE-2020-25374 cyberark vulnerability CVSS: 2.1 28 Oct 2020, 20:15 UTC

CyberArk Privileged Session Manager (PSM) 10.9.0.15 allows attackers to discover internal pathnames by reading an error popup message after two hours of idle time.

CVE-2020-4062 cyberark vulnerability CVSS: 7.7 22 Jun 2020, 16:15 UTC

In Conjur OSS Helm Chart before 2.0.0, a recently identified critical vulnerability resulted in the installation of the Conjur Postgres database with an open port. This allows an attacker to gain full read & write access to the Conjur Postgres database, including escalating the attacker's privileges to assume full control. A malicious actor who knows the IP address and port number of the Postgres database and has access into the Kubernetes cluster where Conjur runs can gain full read & write access to the Postgres database. This enables the attacker to write a policy that allows full access to retrieve any secret. This Helm chart is a method to install Conjur OSS into a Kubernetes environment. Hence, the systems impacted are only Conjur OSS systems that were deployed using this chart. Other deployments including Docker and the CyberArk Dynamic Access Provider (DAP) are not affected. To remediate this vulnerability, clone the latest Helm Chart and follow the upgrade instructions. If you are not able to fully remediate this vulnerability immediately, you can mitigate some of the risk by making sure Conjur OSS is deployed on an isolated Kubernetes cluster or namespace. The term "isolated" refers to: - No other workloads besides Conjur OSS and its backend database are running in that Kubernetes cluster/namespace. - Kubernetes and helm access to the cluster/namespace is limited to security administrators via Role-Based Access Control (RBAC).

CVE-2019-3800 cyberark vulnerability CVSS: 2.1 05 Aug 2019, 17:15 UTC

CF CLI version prior to v6.45.0 (bosh release version 1.16.0) writes the client id and secret to its config file when the user authenticates with --client-credentials flag. A local authenticated malicious user with access to the CF CLI config file can act as that client, who is the owner of the leaked credentials.

CVE-2019-7442 cyberark vulnerability CVSS: 7.5 08 May 2019, 21:29 UTC

An XML external entity (XXE) vulnerability in the Password Vault Web Access (PVWA) of CyberArk Enterprise Password Vault <=10.7 allows remote attackers to read arbitrary files or potentially bypass authentication via a crafted DTD in the SAML authentication system.

CVE-2018-14894 cyberark vulnerability CVSS: 4.6 09 Apr 2019, 18:29 UTC

CyberArk Endpoint Privilege Manager 10.2.1.603 and earlier allows an attacker (who is able to edit permissions of a file) to bypass intended access restrictions and execute blocked applications.

CVE-2019-9627 cyberark vulnerability CVSS: 6.9 08 Mar 2019, 19:29 UTC

A buffer overflow in the kernel driver CybKernelTracker.sys in CyberArk Endpoint Privilege Manager versions prior to 10.7 allows an attacker (without Administrator privileges) to escalate privileges or crash the machine by loading an image, such as a DLL, with a long path.

CVE-2018-13052 cyberark vulnerability CVSS: 7.5 05 Jul 2018, 20:29 UTC

In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process that executes as Admin.

CVE-2018-12903 cyberark vulnerability CVSS: 3.5 26 Jun 2018, 22:29 UTC

In CyberArk Endpoint Privilege Manager (formerly Viewfinity) 10.2.1.603, there is persistent XSS via an account name on the create token screen, the VfManager.asmx SelectAccounts->DisplayName screen, a user's groups in ConfigurationPage, the Dialog Title field, and App Group Name in the Application Group Wizard.

CVE-2018-9843 cyberark vulnerability CVSS: 7.5 12 Apr 2018, 15:29 UTC

The REST API in CyberArk Password Vault Web Access before 9.9.5 and 10.x before 10.1 allows remote attackers to execute arbitrary code via a serialized .NET object in an Authorization HTTP header.