Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

Posted on August 6, 2025August 6, 2025 By CWS

Identification safety and entry administration agency CyberArk has patched a number of critical vulnerabilities that would result in unauthenticated distant code execution, doubtlessly enabling risk actors to realize entry to helpful enterprise secrets and techniques.

The vulnerabilities had been discovered by researchers at agentic id safety agency Cyata in CyberArk Conjur, an open supply secrets and techniques administration resolution that’s utilized by many organizations for managing machine and AI identities and for brokering safe entry between numerous enterprise environments.

Conjur is designed for securely storing, managing and controlling entry to credentials, certificates, API keys and different enterprise secrets and techniques utilized in cloud and DevOps environments, which could possibly be extremely helpful to risk actors.

Cyata found a collection of vulnerabilities, together with ones permitting IAM authentication bypass, privilege escalation, info disclosure, and arbitrary code execution. 

Chaining the failings permits a distant, unauthenticated attacker to execute arbitrary code on the focused system without having any password, token or AWS credentials. 

[ Read: Palo Alto Networks to Acquire CyberArk for $25 Billion ]

The vulnerabilities are tracked as CVE-2025-49827, CVE-2025-49831 (each IAM authenticator bypasses), CVE-2025-49828 (distant code execution), CVE-2025-49830 (path traversal and file disclosure), and CVE-2025-49829 (lacking validations).

CyberArk was notified in regards to the findings in late Might and the corporate introduced the provision of patches in a weblog submit revealed on July 15. Prospects had beforehand been notified in regards to the flaws and patches.Commercial. Scroll to proceed studying.

CyberArk’s Secrets and techniques Supervisor, Self-Hosted (previously Conjur Enterprise) and Conjur open supply are affected.

“So far as we all know, these vulnerabilities haven’t been exploited within the wild, however we strongly encourage all customers of the affected software program to deploy the newly launched patches as quickly as potential,” CyberArk stated.

Along with the CyberArk product vulnerabilities, Cyata researchers found flaws in one other broadly used secrets and techniques administration platform, HashiCorp Vault. A complete of 9 vulnerabilities had been discovered, a few of them permitting distant code execution and a full system takeover. 

Cyata introduced its findings on Wednesday on the Black Hat convention and disclosed technical particulars in a weblog submit. 

Associated: Flaws Expose 100 Dell Laptop computer Fashions to Implants, Home windows Login Bypass

Associated: Reclaiming Management: How Enterprises Can Repair Damaged Safety Operations

Associated: Flaw in Vibe Coding Platform Base44 Uncovered Personal Enterprise Purposes

Security Week News Tags:Conjur, CyberArk, Enterprise, Exposed, Secrets, Vulnerabilities

Post navigation

Previous Post: Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Next Post: Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Related Posts

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Security Week News
New York Seeking Public Opinion on Water Systems Cyber Regulations Security Week News
Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield Security Week News
Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  Security Week News
Microsoft Offers $5 Million at Zero Day Quest Hacking Contest Security Week News
Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover 
  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
  • 239 Malicious Android Apps on Google Play With Downloaded Over 40 Million Times
  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover 
  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
  • 239 Malicious Android Apps on Google Play With Downloaded Over 40 Million Times
  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News