CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://www.cyberark.com/resources/blog/introducing-cyberark-endpoint-privilege-manager | vendor advisory |
https://gist.github.com/inc0d3/47294c1e73ef8cbdc098e739d086efbc | third party advisory exploit |