Description
An attacker of Secrets Manager, Self-Hosted installations that route traffic from Secrets Manager to AWS through a misconfigured network device can reroute authentication requests to a malicious server under the attacker’s control. CyberArk believes there to be very few installations where this issue can be actively exploited, though Secrets Manager, Self-Hosted (formerly Conjur Enterprise) prior to versions 13.5.1 and 13.6.1 and Conjur OSS prior to version 1.22.1 may be affected. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-49831, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-49831 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Insufficient-Authentication
- https://capec.mitre.org/data/definitions/114.html
- https://capec.mitre.org/data/definitions/115.html
- https://capec.mitre.org/data/definitions/151.html
- https://capec.mitre.org/data/definitions/194.html
- https://capec.mitre.org/data/definitions/22.html
- https://capec.mitre.org/data/definitions/57.html
- https://capec.mitre.org/data/definitions/593.html
- https://capec.mitre.org/data/definitions/633.html
- https://capec.mitre.org/data/definitions/650.html
- https://capec.mitre.org/data/definitions/94.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-49831