Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

Posted on August 6, 2025August 6, 2025 By CWS

Identification safety and entry administration agency CyberArk has patched a number of critical vulnerabilities that would result in unauthenticated distant code execution, doubtlessly enabling risk actors to realize entry to helpful enterprise secrets and techniques.

The vulnerabilities had been discovered by researchers at agentic id safety agency Cyata in CyberArk Conjur, an open supply secrets and techniques administration resolution that’s utilized by many organizations for managing machine and AI identities and for brokering safe entry between numerous enterprise environments.

Conjur is designed for securely storing, managing and controlling entry to credentials, certificates, API keys and different enterprise secrets and techniques utilized in cloud and DevOps environments, which could possibly be extremely helpful to risk actors.

Cyata found a collection of vulnerabilities, together with ones permitting IAM authentication bypass, privilege escalation, info disclosure, and arbitrary code execution. 

Chaining the failings permits a distant, unauthenticated attacker to execute arbitrary code on the focused system without having any password, token or AWS credentials. 

[ Read: Palo Alto Networks to Acquire CyberArk for $25 Billion ]

The vulnerabilities are tracked as CVE-2025-49827, CVE-2025-49831 (each IAM authenticator bypasses), CVE-2025-49828 (distant code execution), CVE-2025-49830 (path traversal and file disclosure), and CVE-2025-49829 (lacking validations).

CyberArk was notified in regards to the findings in late Might and the corporate introduced the provision of patches in a weblog submit revealed on July 15. Prospects had beforehand been notified in regards to the flaws and patches.Commercial. Scroll to proceed studying.

CyberArk’s Secrets and techniques Supervisor, Self-Hosted (previously Conjur Enterprise) and Conjur open supply are affected.

“So far as we all know, these vulnerabilities haven’t been exploited within the wild, however we strongly encourage all customers of the affected software program to deploy the newly launched patches as quickly as potential,” CyberArk stated.

Along with the CyberArk product vulnerabilities, Cyata researchers found flaws in one other broadly used secrets and techniques administration platform, HashiCorp Vault. A complete of 9 vulnerabilities had been discovered, a few of them permitting distant code execution and a full system takeover. 

Cyata introduced its findings on Wednesday on the Black Hat convention and disclosed technical particulars in a weblog submit. 

Associated: Flaws Expose 100 Dell Laptop computer Fashions to Implants, Home windows Login Bypass

Associated: Reclaiming Management: How Enterprises Can Repair Damaged Safety Operations

Associated: Flaw in Vibe Coding Platform Base44 Uncovered Personal Enterprise Purposes

Security Week News Tags:Conjur, CyberArk, Enterprise, Exposed, Secrets, Vulnerabilities

Post navigation

Previous Post: How to Secure Data in Transit and at Rest
Next Post: Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Related Posts

Air France, KLM Say Hackers Accessed Customer Data Security Week News
AppSignal Raises $22 Million for Application Monitoring Solution Security Week News
Cisco Patches 35 Vulnerabilities Across Several Products Security Week News
NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO Security Week News
Microsoft Names New Operating CISOs in Strategic Move to Strengthen Cyberdefense Security Week News
Organizations Warned of Exploited Sudo Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild
  • Claude Opus 4.5 Now Integrated with GitHub Copilot
  • Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild
  • Claude Opus 4.5 Now Integrated with GitHub Copilot
  • Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark