Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4064: CWE-862 in Devolutions PowerShell Universal

0
High
VulnerabilityCVE-2026-4064cvecve-2026-4064cwe-862
Published: Tue Mar 17 2026 (03/17/2026, 19:14:17 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: PowerShell Universal

Description

Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading sensitive data, creating or deleting resources, and disrupting service operations — via crafted gRPC requests.

AI-Powered Analysis

AILast updated: 03/17/2026, 20:04:03 UTC

Technical Analysis

CVE-2026-4064 is a security vulnerability identified in Devolutions PowerShell Universal, specifically affecting versions prior to 2026.1.4. The root cause is missing authorization checks on multiple gRPC service endpoints, which are used for remote procedure calls within the application. This flaw allows any authenticated user possessing a valid token—regardless of their assigned roles—to bypass role-based access controls (RBAC). Consequently, an attacker can perform privileged operations that should normally be restricted, including reading sensitive data, creating or deleting resources, and disrupting service operations. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to verify whether the authenticated user is authorized to perform the requested actions. Exploitation requires authentication but no elevated privileges or user interaction beyond possessing a valid token. The vulnerability affects PowerShell Universal version 2026.1.0 and possibly earlier versions, with no patch available at the time of disclosure. No known exploits have been reported in the wild yet. The vulnerability impacts the confidentiality, integrity, and availability of the affected systems by allowing unauthorized access and manipulation of critical resources and data. PowerShell Universal is widely used for automation and orchestration in enterprise environments, making this vulnerability particularly concerning for organizations relying on it for operational workflows.

Potential Impact

The impact of CVE-2026-4064 is significant for organizations using affected versions of PowerShell Universal. Attackers who gain access with any valid token can escalate privileges beyond their intended scope, potentially accessing sensitive configuration data, credentials, or operational secrets. They can also create or delete resources, which may disrupt automated workflows, cause service outages, or corrupt system states. The ability to bypass RBAC undermines trust in the security model of the application and increases the risk of insider threats or compromised accounts being leveraged for lateral movement. Organizations in sectors relying heavily on automation and orchestration—such as finance, healthcare, government, and critical infrastructure—face increased risks of operational disruption and data breaches. The lack of known exploits in the wild reduces immediate risk but does not diminish the urgency to remediate, as the vulnerability is straightforward to exploit once an attacker has authenticated access. The scope of affected systems is limited to deployments of PowerShell Universal before version 2026.1.4, but given the product's use in enterprise environments worldwide, the potential impact is broad.

Mitigation Recommendations

To mitigate CVE-2026-4064, organizations should prioritize upgrading PowerShell Universal to version 2026.1.4 or later once the patch is released by Devolutions. Until a patch is available, organizations should enforce strict access controls on authentication tokens, ensuring that only trusted users have valid tokens. Implement network segmentation and firewall rules to restrict access to gRPC service endpoints to only necessary systems and users. Monitor logs and network traffic for unusual gRPC requests or privilege escalation attempts. Employ multi-factor authentication (MFA) to reduce the risk of token compromise. Review and audit role assignments and token issuance processes to minimize the number of users with valid tokens. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect anomalous behavior related to unauthorized resource manipulation. Finally, maintain an incident response plan that includes scenarios involving privilege escalation and unauthorized access within automation platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2026-03-12T17:37:00.624Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b9aedc771bdb1749d15200

Added to database: 3/17/2026, 7:43:24 PM

Last enriched: 3/17/2026, 8:04:03 PM

Last updated: 3/18/2026, 5:21:21 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses