Discovery of Vulnerability in CyberArk Enterprise Password Vault

Buzz

Ngày cập nhật gần nhất: 15/4/2026

Frequently Asked Questions

1.

What vulnerability was discovered in the CyberArk Enterprise Password Vault application?

Researchers identified a remote code execution vulnerability (CVE-2018-9843) in CyberArk's Enterprise Password Vault. This flaw could allow attackers unauthorized access to systems using web application privileges, potentially compromising sensitive password management.
2.

How can enterprises mitigate the risk of this CyberArk vulnerability?

To mitigate the CyberArk vulnerability, enterprises should upgrade to CyberArk Password Vault Web Access version 9.9.5, 9.10, or 10.2. If immediate upgrades are not feasible, it's advisable to disable access rights to the API at /PasswordVault/WebServices.
3.

What is the root cause of the CyberArk vulnerability?

The root cause of the CyberArk vulnerability lies in insecure deserialization handling by web servers, which allows attackers to manipulate authentication token codes. This leads to potential unauthorized remote code execution on the web server.
4.

What should users do after discovering vulnerabilities in CyberArk applications?

Users of CyberArk applications should promptly update their software to the latest versions provided by CyberArk to ensure vulnerabilities are patched. This is critical for maintaining the security of sensitive password management systems.

Mytour's content is for customer care and travel encouragement only, and we are not responsible.

For errors or inappropriate content, please contact us at: [email protected]