Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

Posted on August 6, 2025August 6, 2025 By CWS

Identification safety and entry administration agency CyberArk has patched a number of critical vulnerabilities that would result in unauthenticated distant code execution, doubtlessly enabling risk actors to realize entry to helpful enterprise secrets and techniques.

The vulnerabilities had been discovered by researchers at agentic id safety agency Cyata in CyberArk Conjur, an open supply secrets and techniques administration resolution that’s utilized by many organizations for managing machine and AI identities and for brokering safe entry between numerous enterprise environments.

Conjur is designed for securely storing, managing and controlling entry to credentials, certificates, API keys and different enterprise secrets and techniques utilized in cloud and DevOps environments, which could possibly be extremely helpful to risk actors.

Cyata found a collection of vulnerabilities, together with ones permitting IAM authentication bypass, privilege escalation, info disclosure, and arbitrary code execution. 

Chaining the failings permits a distant, unauthenticated attacker to execute arbitrary code on the focused system without having any password, token or AWS credentials. 

[ Read: Palo Alto Networks to Acquire CyberArk for $25 Billion ]

The vulnerabilities are tracked as CVE-2025-49827, CVE-2025-49831 (each IAM authenticator bypasses), CVE-2025-49828 (distant code execution), CVE-2025-49830 (path traversal and file disclosure), and CVE-2025-49829 (lacking validations).

CyberArk was notified in regards to the findings in late Might and the corporate introduced the provision of patches in a weblog submit revealed on July 15. Prospects had beforehand been notified in regards to the flaws and patches.Commercial. Scroll to proceed studying.

CyberArk’s Secrets and techniques Supervisor, Self-Hosted (previously Conjur Enterprise) and Conjur open supply are affected.

“So far as we all know, these vulnerabilities haven’t been exploited within the wild, however we strongly encourage all customers of the affected software program to deploy the newly launched patches as quickly as potential,” CyberArk stated.

Along with the CyberArk product vulnerabilities, Cyata researchers found flaws in one other broadly used secrets and techniques administration platform, HashiCorp Vault. A complete of 9 vulnerabilities had been discovered, a few of them permitting distant code execution and a full system takeover. 

Cyata introduced its findings on Wednesday on the Black Hat convention and disclosed technical particulars in a weblog submit. 

Associated: Flaws Expose 100 Dell Laptop computer Fashions to Implants, Home windows Login Bypass

Associated: Reclaiming Management: How Enterprises Can Repair Damaged Safety Operations

Associated: Flaw in Vibe Coding Platform Base44 Uncovered Personal Enterprise Purposes

Security Week News Tags:Conjur, CyberArk, Enterprise, Exposed, Secrets, Vulnerabilities

Post navigation

Previous Post: Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Next Post: Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Related Posts

Minnesota Activates National Guard in Response to Cyberattack Security Week News
Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News
New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA Security Week News
Chinese Hackers Hit Drone Sector in Supply Chain Attacks Security Week News
RevEng.ai Raises $4.15 Million to Secure Software Supply Chain Security Week News
Security Theater or Real Defense? The KPIs That Tell the Truth Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
  • Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
  • How to Secure Data in Transit and at Rest
  • Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
  • Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
  • Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
  • How to Secure Data in Transit and at Rest
  • Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
  • Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News