Cyber Posture

CVE-2026-2914

HighLPE

Published: 25 February 2026

Published
25 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2914 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Cyberark Endpoint Privilege Manager. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the improper privilege management flaw (CWE-269) in CyberArk EPM Agent versions 25.10.0 and lower by applying vendor-provided patches or updates as specified in CyberArk release notes.

prevent

Enforces least privilege to limit the scope and impact of unauthorized elevation attempts by low-privilege local attackers exploiting EPM elevation dialogs.

prevent

Mandates enforcement of approved access authorizations, countering the vulnerability's bypass of privilege controls via flawed CyberArk elevation dialogs.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE describes a local software vulnerability in CyberArk EPM that is directly exploitable by a low-privileged attacker to achieve unauthorized privilege escalation (CWE-269), mapping exactly to Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

CyberArk Endpoint Privilege Manager Agent versions 25.10.0 and lower allow potential unauthorized privilege elevation leveraging CyberArk elevation dialogs

Deeper analysisAI

CVE-2026-2914 affects CyberArk Endpoint Privilege Manager (EPM) Agent versions 25.10.0 and lower, enabling potential unauthorized privilege elevation by leveraging CyberArk elevation dialogs. This vulnerability, published on 2026-02-25T02:16:23.130, carries a CVSS v3.1 base score of 7.8 (High) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and is linked to CWE-269 (Improper Privilege Management).

A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation results in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), allowing unauthorized privilege elevation on the affected endpoint.

CyberArk provides relevant mitigation guidance in its EPM release notes at https://docs.cyberark.com/epm/latest/en/content/release%20notes/release-notes.htm and on its product security page at https://www.cyberark.com/product-security/.

Details

CWE(s)

Affected Products

cyberark
endpoint privilege manager
≤ 25.11.0

CVEs Like This One

CVE-2025-66374Same product: Cyberark Endpoint Privilege Manager
CVE-2026-2777Shared CWE-269
CVE-2025-48613Shared CWE-269
CVE-2026-35595Shared CWE-269
CVE-2025-64487Shared CWE-269
CVE-2025-67905Shared CWE-269
CVE-2024-13376Shared CWE-269
CVE-2025-26705Shared CWE-269
CVE-2025-37186Shared CWE-269
CVE-2026-24510Shared CWE-269

References