CVE-2025-49831
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-15

Last updated on: 2025-11-04

Assigner: GitHub, Inc.

Description
An attacker of Secrets Manager, Self-Hosted installations that route traffic from Secrets Manager to AWS through a misconfigured network device can reroute authentication requests to a malicious server under the attacker’s control. CyberArk believes there to be very few installations where this issue can be actively exploited, though Secrets Manager, Self-Hosted (formerly Conjur Enterprise) prior to versions 13.5.1 and 13.6.1 and Conjur OSS prior to version 1.22.1 may be affected. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-15
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
cyberark conjur to 1.22.1 (exc)
cyberark conjur to 13.5.1 (exc)
cyberark conjur 13.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Secrets Manager, Self-Hosted installations that route traffic to AWS through a misconfigured network device. An attacker can exploit this misconfiguration to reroute authentication requests to a malicious server controlled by the attacker. This could allow the attacker to intercept or manipulate authentication traffic. The issue affects versions prior to 13.5.1 and 13.6.1 for Secrets Manager, Self-Hosted and prior to 1.22.1 for Conjur OSS. Fixed versions are 13.5.1, 13.6.1, and 1.22.1 respectively.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to intercept or redirect authentication requests, potentially leading to unauthorized access or compromise of authentication credentials. This could result in unauthorized access to sensitive secrets or systems managed by Secrets Manager, Self-Hosted.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Secrets Manager, Self-Hosted to version 13.5.1 or 13.6.1, or Conjur OSS to version 1.22.1 or later. Additionally, review and correct any misconfigured network devices that route traffic from Secrets Manager to AWS to prevent rerouting authentication requests to malicious servers.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart