Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66374: n/a

0
High
VulnerabilityCVE-2025-66374cvecve-2025-66374
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to achieve privilege escalation through policy elevation of an Administration task.

AI-Powered Analysis

AILast updated: 02/03/2026, 18:00:40 UTC

Technical Analysis

CVE-2025-66374 is a vulnerability identified in CyberArk Endpoint Privilege Manager Agent versions through 25.10.0 that permits a local user to escalate privileges by leveraging the policy elevation mechanism for administrative tasks. The vulnerability arises because the agent improperly enforces privilege boundaries when applying policy-based elevation, allowing a non-privileged local user to gain administrative rights on the endpoint. This type of privilege escalation can be exploited by an attacker who already has local access, such as a low-privileged user or a malicious insider, to gain full control over the system. The lack of a CVSS score indicates that the vulnerability is newly published and not yet fully assessed. No known public exploits or patches are currently available, increasing the urgency for organizations to implement interim controls. CyberArk Endpoint Privilege Manager is widely deployed in enterprise environments to manage and restrict privileged access, making this vulnerability particularly critical as it undermines the core security function of the product. The vulnerability could be exploited to disable security controls, install persistent malware, or move laterally within a network. The technical details confirm the vulnerability was reserved in late 2025 and published in early 2026, indicating recent discovery. The absence of required user interaction and the local nature of the exploit simplify exploitation for insiders or attackers with limited access.

Potential Impact

For European organizations, this vulnerability poses a significant risk to endpoint security and overall network integrity. Successful exploitation allows attackers to gain administrative privileges on affected endpoints, potentially leading to full system compromise, unauthorized access to sensitive data, and disruption of critical services. Organizations relying on CyberArk Endpoint Privilege Manager for enforcing least privilege policies may find their security posture severely weakened. This could facilitate lateral movement by attackers, increasing the risk of widespread breaches. Critical sectors such as finance, healthcare, government, and energy in Europe could be particularly impacted due to their reliance on privileged access management solutions. The vulnerability could also undermine compliance with European data protection regulations like GDPR if exploited to access or exfiltrate personal data. The lack of known public exploits reduces immediate risk but also means organizations must proactively address the vulnerability before attackers develop weaponized code.

Mitigation Recommendations

Immediate mitigation steps include restricting local user permissions to the minimum necessary, especially on endpoints running CyberArk Endpoint Privilege Manager. Organizations should implement strict access controls and monitor logs for unusual privilege elevation attempts. Network segmentation can limit lateral movement if compromise occurs. Until an official patch is released, consider disabling or limiting the use of policy elevation features where feasible. Employ endpoint detection and response (EDR) tools to detect anomalous administrative activity. Conduct thorough audits of local user accounts and remove unnecessary privileges. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. Once CyberArk releases a patch, prioritize timely deployment across all affected systems. Engage with CyberArk support and threat intelligence sources for updates and indicators of compromise related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-28T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69823426f9fa50a62fd6b723

Added to database: 2/3/2026, 5:45:10 PM

Last enriched: 2/3/2026, 6:00:40 PM

Last updated: 2/6/2026, 7:42:56 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats