3 September 2025

CyberArk: CA25-30 – Possible stack overflow that can lead to denial of service (DoS).

Issued: September 3, 2025

Updated: N/A

Version: 1.0

Severity: High

CVSS Score: 7

Third-party publication / CVE:
CVE-2025-48924</a >

Impact: Possible stack overflow that can lead to denial of service (DoS).
 

Affected products and versions:

z/OS Credential Provider All versions prior to version 14.2
 
Resolution:

Upgrade to a patch version from the table below by downloading the patch from the respective link and following the instructions in our online documentation.

If a patch isn’t available for your installed version, or if you want to move to the latest available version, upgrade your component according to the upgrade version compatibility docs.
 
Installed version:

z/OS Credential Provider (Java Provider) 14.2 (LTS) and its patches prior to 14.2.3 – Patch version: 14.2.3 – 

z/OS Credential Provider (Java Provider) 12.6 (LTS) and its patches prior to 12.6.6 or earlier versions – Patch version: 12.6.6
 
Temporary mitigation:

There is no temporary mitigation available for this security bulletin.



27 August 2025

CyberArk: CA25-29 – Potential exposure to Prototype Pollution as described in the above third-party CVE

Issued: August 27, 2025

Updated: N/A

Version: 1.0

Severity: High

CVSS Score: 7.8

Third-party publication / CVE: CVE-2024-38996

Impact: Potential exposure to Prototype Pollution as described in the above third-party CVE.
 

Affected products and versions:

Password Vault Web Access (PVWA) Self-Hosted: All versions earlier than 14.2.4 – All product subsets are affected.

* This Security Bulletin applies only to the listed affected products. If this issue also affects another CyberArk product, it will be addressed separately in accordance with CyberArk’s Product Vulnerability Management Policy.

** Relates only to versions that are within their development life cycle. Refer to our End of Life policy for details.

 

Resolution:

Upgrade to a patch version from the table below by downloading the patch from the respective link and following the instructions in our online documentation.

If a patch isn’t available for your installed version, or if you want to move to the latest available version, upgrade your component according to the upgrade version compatibility docs.

PAM On Cloud customers:

 

Temporary mitigation:

There is no temporary mitigation available for this security bulletin.

 

Exploited in the wild in a CyberArk environment:

Not to the best of CyberArk’s knowledge.



22 August 2025

SailPoint Identity Security Cloud – New Updates

Key Highlights from this latest release:

 

  • BeyondTrust Password Safe On-Premise Integration: Identity Security Cloud now supports the BeyondTrust Password Safe (On-Premise) credential provider for Secrets Management. This enables credential cycling directly from BeyondTrust, providing stronger security and streamlined password management

 

  • Workflows – Execution Playback: 
    A new execution playback feature has been introduced for Workflows. Administrators can now “playback” workflow execution logs in the same format as Test Workflow, viewing input/output data step by step. Even if the workflow has been modified since execution, playback restores the original configuration for accurate review and troubleshooting

 

For the full release notes, visit: https://community.sailpoint.com/t5/SaaS-Release-Notes/tkb-p/saas-release-notes



6 August 2025

CyberArk: CA25-28 – Potential session hijacking, allowing unauthorized access to an authenticated Secure Infrastructure Access (SIA) user’s session

Issued: August 06, 2025

Updated: N/A

Version: 1.0

Severity: High

CVSS Score: 8.1

Third-party publication / CVE: N/A

Impact: Potential session hijacking, allowing unauthorized access to an authenticated Secure Infrastructure Access (SIA) user’s session.
 

Affected products and versions:

  • Secure Infrastructure Access: The following SIA connection types are affected when accessed by users authenticated via a federated identity provider (external IdP):SIA-RDPSIA-SSH

* This Security Bulletin applies only to the listed affected products. If this issue also affects another CyberArk product, it will be addressed separately in accordance with CyberArk’s Product Vulnerability Management Policy.

** Relates only to versions that are within their development life cycle. Refer to our End of Life policy for details.

 

Resolution: To address this, connections via Secure Infrastructure Access (SIA) now include an additional, optional authentication factor.

After the initial authentication step, users will be prompted to enter a PIN code in the native client, as part of the SIA authentication flow.

To enable the additional authentication factor, follow the steps below:

  1. Log in to the Identity Administration portal.
  2. Navigate to: Core Services → Policies
  3. Choose an existing policy to edit or click Add Policy Set to create a new one.
  4. Navigate to: Authentication Policies → CyberArk Identity Security Platform
  5. Set the drop-down menu Enable authentication policy controls to Yes.
  6. Check the box for Enable PIN code protection for native clients.
  7. Click Save.

It’s important to note that even if the flag is already enabled, you still need to click ‘Save’ for the new flow to apply.

 

Temporary mitigation:

There is no temporary mitigation available for this security bulletin.