CVE-2026-2914
Published: 25 February 2026
Summary
CVE-2026-2914 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Cyberark Endpoint Privilege Manager. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the improper privilege management flaw (CWE-269) in CyberArk EPM Agent versions 25.10.0 and lower by applying vendor-provided patches or updates as specified in CyberArk release notes.
Enforces least privilege to limit the scope and impact of unauthorized elevation attempts by low-privilege local attackers exploiting EPM elevation dialogs.
Mandates enforcement of approved access authorizations, countering the vulnerability's bypass of privilege controls via flawed CyberArk elevation dialogs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a local software vulnerability in CyberArk EPM that is directly exploitable by a low-privileged attacker to achieve unauthorized privilege escalation (CWE-269), mapping exactly to Exploitation for Privilege Escalation.
NVD Description
CyberArk Endpoint Privilege Manager Agent versions 25.10.0 and lower allow potential unauthorized privilege elevation leveraging CyberArk elevation dialogs
Deeper analysisAI
CVE-2026-2914 affects CyberArk Endpoint Privilege Manager (EPM) Agent versions 25.10.0 and lower, enabling potential unauthorized privilege elevation by leveraging CyberArk elevation dialogs. This vulnerability, published on 2026-02-25T02:16:23.130, carries a CVSS v3.1 base score of 7.8 (High) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and is linked to CWE-269 (Improper Privilege Management).
A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation results in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), allowing unauthorized privilege elevation on the affected endpoint.
CyberArk provides relevant mitigation guidance in its EPM release notes at https://docs.cyberark.com/epm/latest/en/content/release%20notes/release-notes.htm and on its product security page at https://www.cyberark.com/product-security/.
Details
- CWE(s)