CVE-2024-57967

4.2 MEDIUM

📋 TL;DR

This vulnerability in CyberArk's Password Vault Web Access (PVWA) allows potential privilege escalation through LDAP mapping misconfiguration. It affects CyberArk Privileged Access Manager Self-Hosted installations before version 14.4. Attackers could gain unauthorized access to privileged accounts if they already have some level of access to the system.

💻 Affected Systems

Products:
  • CyberArk Privileged Access Manager Self-Hosted
Versions: All versions before 14.4
Operating Systems: Windows Server, Linux (depending on deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PVWA component with LDAP integration configured. Requires existing authentication to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could escalate privileges to access highly sensitive privileged accounts, potentially compromising the entire privileged access management system and downstream systems.

🟠

Likely Case

An attacker with existing access could gain unauthorized access to additional privileged accounts they shouldn't have access to, leading to lateral movement and privilege escalation within the environment.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to potential unauthorized access to specific privileged accounts that the attacker shouldn't have access to.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires existing authenticated access to the PVWA interface and knowledge of LDAP mapping configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.4

Vendor Advisory: https://docs.cyberark.com/pam-self-hosted/latest/en/content/release%20notes/rn-whatsnew14-4.htm#Securitybugfixes

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download CyberArk PAM Self-Hosted version 14.4 from CyberArk support portal. 3. Follow CyberArk's official upgrade documentation for your specific deployment. 4. Apply the upgrade package. 5. Restart all CyberArk services. 6. Verify LDAP mapping configurations post-upgrade.

🔧 Temporary Workarounds

Tighten LDAP Mapping Permissions

all

Review and restrict LDAP mapping configurations to minimum necessary permissions

Review LDAP mapping rules in PVWA configuration
Remove unnecessary LDAP group mappings
Apply principle of least privilege to all LDAP mappings

Enhanced Monitoring

all

Increase monitoring of PVWA authentication and LDAP mapping activities

Enable detailed audit logging for PVWA LDAP operations
Set up alerts for unusual LDAP mapping changes
Monitor for privilege escalation attempts

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access PVWA interface
  • Enhance monitoring and alerting for suspicious LDAP mapping activities and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check CyberArk PAM version in PVWA interface or via CyberArk management tools. If version is below 14.4 and LDAP integration is configured, the system is vulnerable.

Check Version:

Check PVWA web interface or use CyberArk management console to view installed version

Verify Fix Applied:

Verify version is 14.4 or higher in PVWA interface and test LDAP mapping functionality to ensure proper privilege enforcement.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LDAP mapping configuration changes
  • Multiple failed privilege escalation attempts
  • Unexpected successful access to privileged accounts via LDAP mapping

Network Indicators:

  • Unusual authentication patterns to PVWA from specific users
  • Increased LDAP queries from PVWA component

SIEM Query:

source="cyberark" AND (event_type="ldap_mapping_change" OR event_type="privilege_escalation_attempt")

🔗 References

📤 Share & Export