CVE-2025-66374
Published: 03 February 2026
Summary
CVE-2025-66374 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Cyberark Endpoint Privilege Manager. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly addresses the specific privilege escalation vulnerability in the CyberArk Endpoint Privilege Manager Agent by applying patches released in version 25.12.
Least privilege ensures local users and processes operate with minimal access rights, preventing escalation via flawed policy elevation of administration tasks.
Account management includes reviewing and restricting privileges to counter improper privilege management allowing low-privileged local users to elevate to administrator.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct local privilege escalation via improper policy elevation in endpoint agent maps to exploitation for privilege escalation.
NVD Description
CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to achieve privilege escalation through policy elevation of an Administration task.
Deeper analysisAI
CVE-2025-66374 is a privilege escalation vulnerability affecting the CyberArk Endpoint Privilege Manager Agent through version 25.10.0. It allows a local user to elevate privileges via policy elevation of an Administration task. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-269 (Improper Privilege Management), though additional CWE details are unavailable from NVD.
A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, typically resulting in full system privilege escalation on the affected endpoint.
CyberArk addresses this issue in the Endpoint Privilege Manager release notes for version 25.12 under the security section, along with security advisory CA26-01 and their product security page. Security practitioners should consult these resources for patch details, upgrade instructions, and mitigation guidance.
Details
- CWE(s)