CVE-2025-66374

CyberArk · Endpoint Privilege Manager (EPM) Agent

The CyberArk Endpoint Privilege Manager (EPM) Agent is susceptible to a high-severity vulnerability that may allow for the bypass of security controls or unauthorized privilege escalation.

Executive summary

A vulnerability in the CyberArk Endpoint Privilege Manager Agent could allow an attacker to bypass critical security enforcement mechanisms on protected endpoints.

Vulnerability

The vulnerability exists within the agent component of the CyberArk EPM solution. While the specific mechanism is not detailed, it involves a failure in the enforcement of privilege policies, which an authenticated local user can exploit to circumvent security restrictions.

Business impact

This vulnerability is particularly critical as it affects a tool specifically designed to manage and restrict privileges. A successful exploit allows an attacker to regain the very privileges the software is intended to block, leading to unauthorized software installation and potential access to sensitive corporate data. The CVSS score of 7.8 underscores the High risk associated with compromising a core security product.

Remediation

Immediate Action: Upgrade the CyberArk EPM Agent to the latest patched version (post-version 25) as recommended in the CyberArk security portal.

Proactive Monitoring: Review EPM logs for policy bypass alerts and monitor for "Unknown" or "Unmanaged" applications running with administrative tokens.

Compensating Controls: Implement secondary layers of defense, such as AppLocker or Windows Defender Application Control (WDAC), to provide redundancy in case the primary EPM agent is compromised.

Exploitation status

Public Exploit Available: false

Analyst recommendation

CyberArk EPM is a foundational security control; any vulnerability within its agent must be addressed with the highest urgency. Organizations should initiate an immediate deployment of the updated agent to all managed endpoints to maintain the integrity of their least-privilege architecture.