Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

Posted on August 6, 2025August 6, 2025 By CWS

Identification safety and entry administration agency CyberArk has patched a number of critical vulnerabilities that would result in unauthenticated distant code execution, doubtlessly enabling risk actors to realize entry to helpful enterprise secrets and techniques.

The vulnerabilities had been discovered by researchers at agentic id safety agency Cyata in CyberArk Conjur, an open supply secrets and techniques administration resolution that’s utilized by many organizations for managing machine and AI identities and for brokering safe entry between numerous enterprise environments.

Conjur is designed for securely storing, managing and controlling entry to credentials, certificates, API keys and different enterprise secrets and techniques utilized in cloud and DevOps environments, which could possibly be extremely helpful to risk actors.

Cyata found a collection of vulnerabilities, together with ones permitting IAM authentication bypass, privilege escalation, info disclosure, and arbitrary code execution. 

Chaining the failings permits a distant, unauthenticated attacker to execute arbitrary code on the focused system without having any password, token or AWS credentials. 

[ Read: Palo Alto Networks to Acquire CyberArk for $25 Billion ]

The vulnerabilities are tracked as CVE-2025-49827, CVE-2025-49831 (each IAM authenticator bypasses), CVE-2025-49828 (distant code execution), CVE-2025-49830 (path traversal and file disclosure), and CVE-2025-49829 (lacking validations).

CyberArk was notified in regards to the findings in late Might and the corporate introduced the provision of patches in a weblog submit revealed on July 15. Prospects had beforehand been notified in regards to the flaws and patches.Commercial. Scroll to proceed studying.

CyberArk’s Secrets and techniques Supervisor, Self-Hosted (previously Conjur Enterprise) and Conjur open supply are affected.

“So far as we all know, these vulnerabilities haven’t been exploited within the wild, however we strongly encourage all customers of the affected software program to deploy the newly launched patches as quickly as potential,” CyberArk stated.

Along with the CyberArk product vulnerabilities, Cyata researchers found flaws in one other broadly used secrets and techniques administration platform, HashiCorp Vault. A complete of 9 vulnerabilities had been discovered, a few of them permitting distant code execution and a full system takeover. 

Cyata introduced its findings on Wednesday on the Black Hat convention and disclosed technical particulars in a weblog submit. 

Associated: Flaws Expose 100 Dell Laptop computer Fashions to Implants, Home windows Login Bypass

Associated: Reclaiming Management: How Enterprises Can Repair Damaged Safety Operations

Associated: Flaw in Vibe Coding Platform Base44 Uncovered Personal Enterprise Purposes

Security Week News Tags:Conjur, CyberArk, Enterprise, Exposed, Secrets, Vulnerabilities

Post navigation

Previous Post: Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Next Post: Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Related Posts

Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 Security Week News
Check Point to Acquire AI Security Firm Lakera Security Week News
FBI Warns of Spoofed IC3 Website Security Week News
Password Managers Vulnerable to Data Theft via Clickjacking Security Week News
CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? Security Week News
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Flare Raises $30 Million for Threat Exposure Management Platform
  • ConductorOne Raises $79 Million in Series B Funding
  • Securing the Open Android Ecosystem with Samsung Knox
  • Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover 
  • CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Flare Raises $30 Million for Threat Exposure Management Platform
  • ConductorOne Raises $79 Million in Series B Funding
  • Securing the Open Android Ecosystem with Samsung Knox
  • Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover 
  • CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News