Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

Posted on August 6, 2025August 6, 2025 By CWS

Identification safety and entry administration agency CyberArk has patched a number of critical vulnerabilities that would result in unauthenticated distant code execution, doubtlessly enabling risk actors to realize entry to helpful enterprise secrets and techniques.

The vulnerabilities had been discovered by researchers at agentic id safety agency Cyata in CyberArk Conjur, an open supply secrets and techniques administration resolution that’s utilized by many organizations for managing machine and AI identities and for brokering safe entry between numerous enterprise environments.

Conjur is designed for securely storing, managing and controlling entry to credentials, certificates, API keys and different enterprise secrets and techniques utilized in cloud and DevOps environments, which could possibly be extremely helpful to risk actors.

Cyata found a collection of vulnerabilities, together with ones permitting IAM authentication bypass, privilege escalation, info disclosure, and arbitrary code execution. 

Chaining the failings permits a distant, unauthenticated attacker to execute arbitrary code on the focused system without having any password, token or AWS credentials. 

[ Read: Palo Alto Networks to Acquire CyberArk for $25 Billion ]

The vulnerabilities are tracked as CVE-2025-49827, CVE-2025-49831 (each IAM authenticator bypasses), CVE-2025-49828 (distant code execution), CVE-2025-49830 (path traversal and file disclosure), and CVE-2025-49829 (lacking validations).

CyberArk was notified in regards to the findings in late Might and the corporate introduced the provision of patches in a weblog submit revealed on July 15. Prospects had beforehand been notified in regards to the flaws and patches.Commercial. Scroll to proceed studying.

CyberArk’s Secrets and techniques Supervisor, Self-Hosted (previously Conjur Enterprise) and Conjur open supply are affected.

“So far as we all know, these vulnerabilities haven’t been exploited within the wild, however we strongly encourage all customers of the affected software program to deploy the newly launched patches as quickly as potential,” CyberArk stated.

Along with the CyberArk product vulnerabilities, Cyata researchers found flaws in one other broadly used secrets and techniques administration platform, HashiCorp Vault. A complete of 9 vulnerabilities had been discovered, a few of them permitting distant code execution and a full system takeover. 

Cyata introduced its findings on Wednesday on the Black Hat convention and disclosed technical particulars in a weblog submit. 

Associated: Flaws Expose 100 Dell Laptop computer Fashions to Implants, Home windows Login Bypass

Associated: Reclaiming Management: How Enterprises Can Repair Damaged Safety Operations

Associated: Flaw in Vibe Coding Platform Base44 Uncovered Personal Enterprise Purposes

Security Week News Tags:Conjur, CyberArk, Enterprise, Exposed, Secrets, Vulnerabilities

Post navigation

Previous Post: Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Next Post: Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Related Posts

Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication Security Week News
Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users Security Week News
Ransomware Losses Climb as AI Pushes Phishing to New Heights Security Week News
Fortinet, Ivanti, Nvidia Release Security Updates Security Week News
Compumedics Ransomware Attack Led to Data Breach Impacting 318,000 Security Week News
Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed
  • First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code
  • Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed
  • First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code
  • Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News