Cyberark Security Vulnerabilities (CVEs)

Track 10 security vulnerabilities affecting Cyberark products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

2 Critical
4 High
4 Medium
🔔 Get Alerts for Cyberark
CVE-2025-66374 7.8

This vulnerability in CyberArk Endpoint Privilege Manager Agent allows a local user to escalate privileges by exploiting policy elevation of an Admini...

Feb 3, 2026
CVE-2025-49831 9.8

This vulnerability allows attackers to reroute authentication requests from Secrets Manager to malicious servers when network devices are misconfigure...

Jul 15, 2025
CVE-2025-49829 6.5

This vulnerability in Conjur secrets management software allows authenticated attackers to inject unauthorized resources into the database and bypass ...

Jul 15, 2025
CVE-2025-49827 9.8

This vulnerability allows attackers to bypass IAM authentication in Conjur by manipulating AWS-signed headers to redirect validation requests to malic...

Jul 15, 2025
CVE-2024-54840 4.2

This vulnerability in CyberArk's Password Vault Web Access (PVWA) allows attackers to perform Host header injection attacks when environment issues ar...

Feb 3, 2025
CVE-2024-42340 8.3

This vulnerability in CyberArk products involves client-side enforcement of server-side security (CWE-602), allowing attackers to bypass intended secu...

Aug 25, 2024
CVE-2024-42339 4.3

This CVE describes an information exposure vulnerability in CyberArk products where sensitive information could be accessed by unauthorized actors. Or...

Aug 25, 2024
CVE-2024-42337 4.3

This CVE describes an information exposure vulnerability in CyberArk products where sensitive information could be accessed by unauthorized actors. Or...

Aug 25, 2024
CVE-2017-11197 7.8

This vulnerability in CyberArk Viewfinity allows low-privilege users to escalate to administrative privileges by exploiting a bug in the 'add printer'...

May 3, 2023
CVE-2021-31796 7.5

This vulnerability in CyberArk Credential Provider allows attackers to decrypt credential files due to insufficient encryption key space. Attackers ca...

Sep 2, 2021

Why Monitor Cyberark Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 10+ known vulnerabilities affecting Cyberark products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Cyberark packages in under 60 seconds. No agents required - completely agentless scanning that works across Cyberark deployments.

Free vulnerability database: Access detailed information about every Cyberark CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Cyberark CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Cyberark CVEs Free