CVE-2025-22271 – CyberArk Endpoint Privilege Manager IP Address Spoofing Vulnerability

The following table lists the changes that have been made to the
CVE-2025-22271 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 28, 2025

    Action Type Old Value New Value
    Added Description The application or its infrastructure allows for IP address spoofing by providing its own value in the “X-Forwarded-For” header. Thus, the action logging mechanism in the application loses accountability

    This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.

    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-290
    Added Reference https://cert.pl/en/posts/2025/02/CVE-2025-22270/
    Added Reference https://cert.pl/posts/2025/02/CVE-2025-22270/
    Added Reference https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm
Share the Post:

Related Posts