Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1768: CWE-863 Incorrect Authorization in Devolutions Devolutions Server

0
Unknown
VulnerabilityCVE-2026-1768cvecve-2026-1768cwe-863
Published: Tue Feb 24 2026 (02/24/2026, 19:01:07 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Devolutions Server

Description

A permission cache poisoning vulnerability in Devolutions Server allows authenticated users to bypass permissions to access entries.This issue affects Devolutions Server: before 2025.3.15.

AI-Powered Analysis

AILast updated: 02/24/2026, 19:33:41 UTC

Technical Analysis

CVE-2026-1768 identifies a critical authorization bypass vulnerability in Devolutions Server, a privileged access management solution widely used for secure credential and session management. The root cause is a permission cache poisoning issue, where the server's caching mechanism for user permissions can be manipulated by authenticated users to gain unauthorized access to entries they should not be able to access. This vulnerability is classified under CWE-863, indicating incorrect authorization logic. Specifically, the permission cache does not properly validate or isolate cached permissions per user session, allowing an attacker to poison the cache and bypass intended access controls. This flaw affects all versions of Devolutions Server prior to 2025.3.15. Although no public exploits have been reported, the vulnerability could allow attackers with valid credentials to escalate privileges and access sensitive information, undermining confidentiality and integrity. The lack of a CVSS score suggests the need for a severity assessment based on impact and exploitability factors. The vulnerability requires authentication but no additional user interaction, making it easier to exploit in environments where users have legitimate access. The scope includes all affected Devolutions Server deployments, which are commonly used in enterprise environments for managing privileged credentials and sessions. The vendor has not yet released a patch, so mitigation currently relies on compensating controls and monitoring.

Potential Impact

The primary impact of CVE-2026-1768 is unauthorized access to sensitive entries within Devolutions Server, potentially exposing credentials, session data, or configuration information critical to enterprise security. This can lead to privilege escalation, lateral movement within networks, and compromise of other connected systems. Organizations relying on Devolutions Server for privileged access management face risks to confidentiality and integrity of their secrets and administrative sessions. The vulnerability does not appear to directly affect availability but could indirectly cause operational disruptions if exploited. Since the flaw requires authentication, insider threats or compromised accounts are the most likely vectors. The widespread use of Devolutions Server in sectors such as finance, government, healthcare, and critical infrastructure increases the potential impact globally. Attackers exploiting this vulnerability could bypass security policies, leading to data breaches, regulatory non-compliance, and reputational damage.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls to limit the number of users with authenticated access to Devolutions Server. Enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce risk of credential compromise. Monitor logs and audit trails for unusual access patterns or permission changes that could indicate cache poisoning attempts. Consider isolating Devolutions Server instances in segmented network zones with limited access. Regularly review and update user permissions to follow the principle of least privilege. If possible, disable or restrict caching features related to permissions until patched. Engage with Devolutions support for any available workarounds or interim fixes. Once a patch is available, prioritize immediate deployment across all affected systems. Conduct post-patch validation to ensure the vulnerability is fully remediated and no residual cache poisoning remains.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2026-02-02T15:49:01.125Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699df93ebe58cf853b1d7e86

Added to database: 2/24/2026, 7:17:18 PM

Last enriched: 2/24/2026, 7:33:41 PM

Last updated: 2/24/2026, 10:21:10 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats