Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49831: CWE-287: Improper Authentication in cyberark conjur

0
Critical
VulnerabilityCVE-2025-49831cvecve-2025-49831cwe-287
Published: Tue Jul 15 2025 (07/15/2025, 20:10:35 UTC)
Source: CVE Database V5
Vendor/Project: cyberark
Product: conjur

Description

An attacker of Secrets Manager, Self-Hosted installations that route traffic from Secrets Manager to AWS through a misconfigured network device can reroute authentication requests to a malicious server under the attacker’s control. CyberArk believes there to be very few installations where this issue can be actively exploited, though Secrets Manager, Self-Hosted (formerly Conjur Enterprise) prior to versions 13.5.1 and 13.6.1 and Conjur OSS prior to version 1.22.1 may be affected. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:54:29 UTC

Technical Analysis

CVE-2025-49831 is an improper authentication vulnerability (CWE-287) affecting CyberArk Conjur Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur OSS. The vulnerability arises when authentication requests from Secrets Manager to AWS are routed through a misconfigured network device, allowing an attacker to intercept and reroute these requests to a malicious server under their control. This rerouting enables the attacker to bypass proper authentication mechanisms, potentially gaining unauthorized access to secrets or sensitive credentials managed by Conjur. The affected versions include Conjur OSS versions prior to 1.22.1 and Secrets Manager, Self-Hosted versions prior to 13.5.1 and version 13.6. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, partial attack requirements, no privileges or user interaction needed, and high impact on confidentiality and integrity. CyberArk has released fixed versions (Conjur OSS 1.22.1 and Secrets Manager 13.5.1/13.6.1) to remediate this issue. While exploitation requires a specific network misconfiguration, the potential for credential compromise and unauthorized access to secrets makes this vulnerability critical for affected deployments.

Potential Impact

For European organizations, the impact of CVE-2025-49831 can be severe, particularly for those relying on CyberArk Conjur for managing secrets and credentials in cloud or hybrid environments. Successful exploitation could lead to unauthorized access to sensitive credentials, enabling attackers to move laterally within networks, escalate privileges, or exfiltrate critical data. This risk is amplified in sectors such as finance, healthcare, energy, and government, where secrets management is integral to operational security. The vulnerability could undermine trust in automated authentication workflows and cloud integrations, potentially causing service disruptions or compliance violations under regulations like GDPR. Although the attack requires a misconfigured network device, the complexity is low and no user interaction is needed, increasing the threat to organizations with complex network architectures or insufficient network segmentation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for targeted attacks.

Mitigation Recommendations

European organizations using CyberArk Conjur Secrets Manager, Self-Hosted or Conjur OSS should immediately verify their product versions and upgrade to Conjur OSS 1.22.1 or Secrets Manager versions 13.5.1/13.6.1 or later. Network administrators must audit and correct any misconfigurations in network devices that route traffic between Secrets Manager and AWS, ensuring that authentication requests cannot be intercepted or rerouted. Implement strict network segmentation and use encrypted, authenticated channels (e.g., TLS with mutual authentication) for all communication between Secrets Manager and cloud services. Employ network monitoring and anomaly detection to identify unusual routing or traffic redirection attempts. Regularly review and harden firewall and routing policies to prevent unauthorized traffic manipulation. Additionally, conduct penetration testing focused on network routing and authentication flows to detect potential weaknesses. Maintain an incident response plan that includes rapid patch deployment and investigation procedures for suspicious authentication activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-11T14:33:57.799Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6876bae4a83201eaacd0a1e0

Added to database: 7/15/2025, 8:32:36 PM

Last enriched: 11/4/2025, 9:54:29 PM

Last updated: 11/16/2025, 7:44:28 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats