Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3638: CWE-862: Missing Authorization in Devolutions Server

0
High
VulnerabilityCVE-2026-3638cvecve-2026-3638cwe-862
Published: Mon Mar 09 2026 (03/09/2026, 18:51:13 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Server

Description

CVE-2026-3638 is a missing authorization vulnerability in Devolutions Server versions 2025. 3. 11. 0 and earlier. It allows low-privileged authenticated users to restore deleted users and roles by exploiting improper access control in the user and role restore API endpoints. This flaw enables unauthorized privilege escalation by reinstating previously removed accounts or roles, potentially bypassing intended security restrictions. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on Devolutions Server for privileged access management. Mitigation requires careful access control validation and patching once available. Organizations should monitor API usage and restrict access to trusted users only. Countries with high adoption of Devolutions Server and critical infrastructure relying on privileged access management are at greater risk.

AI-Powered Analysis

AILast updated: 03/09/2026, 19:18:44 UTC

Technical Analysis

CVE-2026-3638 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Devolutions Server, a privileged access management solution widely used for managing credentials and access rights. The issue resides in the user and role restore API endpoints, which lack proper authorization checks. This allows a low-privileged authenticated user to craft API requests that restore deleted users and roles, effectively bypassing intended access control policies. By restoring deleted accounts or roles, an attacker can regain elevated privileges or reintroduce previously removed access rights, undermining the security posture of the affected environment. The vulnerability affects Devolutions Server versions 2025.3.11.0 and earlier. No CVSS score has been assigned yet, and no public exploits have been reported. However, the flaw represents a critical security gap in the authorization logic of a core component responsible for access management. The absence of patch links suggests that a fix may still be pending or in development. Organizations using Devolutions Server should be aware of this vulnerability and prepare to apply updates promptly once available. Monitoring API access patterns and restricting API usage to trusted administrators can reduce exploitation risk in the interim.

Potential Impact

The impact of CVE-2026-3638 is significant for organizations relying on Devolutions Server for privileged access management. Exploitation allows unauthorized restoration of deleted users and roles, which can lead to privilege escalation, unauthorized access to sensitive systems, and potential insider threat scenarios. Attackers could reinstate accounts that were removed due to suspicious activity or policy violations, thereby bypassing security controls and potentially gaining persistent access. This undermines the integrity and confidentiality of critical credentials and systems managed by Devolutions Server. The availability impact is indirect but could arise if malicious actors disrupt access controls or cause administrative confusion. Given the central role of Devolutions Server in managing privileged credentials, exploitation could facilitate lateral movement and compromise of broader enterprise networks. The lack of known exploits currently limits immediate risk, but the vulnerability's nature makes it attractive for attackers targeting organizations with weak internal monitoring or segmented access controls.

Mitigation Recommendations

To mitigate CVE-2026-3638, organizations should implement the following specific measures: 1) Immediately restrict API access to the user and role restore endpoints to only the most trusted and necessary administrators, using network segmentation and firewall rules where possible. 2) Monitor API logs for unusual restore requests or patterns indicative of unauthorized activity. 3) Implement additional internal authorization checks or compensating controls at the application or proxy level if feasible, to validate user privileges before allowing restore operations. 4) Prepare to apply vendor patches or updates as soon as they are released by Devolutions to address the missing authorization flaw. 5) Conduct regular audits of user and role changes to detect unexpected restorations or privilege escalations. 6) Educate administrators on the risk and encourage strong credential hygiene and multi-factor authentication to reduce the risk of compromised low-privilege accounts being used to exploit this vulnerability. 7) Consider temporary disabling of the restore API endpoints if business operations allow, until a patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2026-03-06T15:19:48.882Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69af19aeea502d3aa8b3c468

Added to database: 3/9/2026, 7:04:14 PM

Last enriched: 3/9/2026, 7:18:44 PM

Last updated: 3/9/2026, 8:05:27 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses