Cyber Posture

CVE-2026-3130

Critical

Published: 03 March 2026

Published
03 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3130 is a critical-severity Improper Enforcement of Behavioral Workflow (CWE-841) vulnerability in Devolutions Devolutions Server. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Account Access Removal (T1531); ranked at the 6.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-2 (Account Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Account Access Removal (T1531). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires enforcement of approved authorizations, directly addressing the improper enforcement allowing bulk deletion of checked-out PAM accounts.

prevent

Mandates access restrictions and validation for change mechanisms like bulk deletions, preventing bypass of checked-out account protections.

prevent

Ensures proper management of accounts including conditions for removal, mitigating risks of unauthorized deletions of active checked-out accounts.

MITRE ATT&CK Enterprise TechniquesAI

T1531 Account Access Removal Impact
Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.
Why these techniques?

Vulnerability directly bypasses check-out protections to enable unauthorized deletion of PAM accounts, mapping to Account Access Removal.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Enforcement of Behavioral Controls in Devolutions Server 2025.3.15 and earlier allows an authenticated attacker with the delete permission to delete a PAM account that is currently checked out by selecting it alongside at least one non-checked-out account and performing…

more

a bulk deletion.

Deeper analysisAI

CVE-2026-3130 is an Improper Enforcement of Behavioral Controls vulnerability (CWE-841) in Devolutions Server versions 2025.3.15 and earlier. Published on 2026-03-03T22:16:29.280, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The flaw enables improper handling of bulk deletions for PAM accounts, bypassing protections for checked-out entries.

An authenticated attacker possessing delete permission can exploit this vulnerability over the network with low complexity and no user interaction. By selecting a currently checked-out PAM account alongside at least one non-checked-out account and initiating a bulk deletion, the attacker can delete the protected checked-out account, potentially leading to high impacts on confidentiality, integrity, and availability.

The Devolutions security advisory DEVO-2026-0005 at https://devolutions.net/security/advisories/DEVO-2026-0005 provides further details on the issue, including recommended mitigations and patches.

Details

CWE(s)

Affected Products

devolutions
devolutions server
≤ 2025.3.16.0

CVEs Like This One

CVE-2026-4924Same product: Devolutions Devolutions Server
CVE-2026-0610Same product: Devolutions Devolutions Server
CVE-2026-3224Same product: Devolutions Devolutions Server
CVE-2026-4434Same product: Devolutions Devolutions Server
CVE-2025-2277Same product: Devolutions Devolutions Server
CVE-2026-1007Same product: Devolutions Devolutions Server
CVE-2025-2280Same product: Devolutions Devolutions Server
CVE-2026-3204Same product: Devolutions Devolutions Server
CVE-2026-4828Same product: Devolutions Devolutions Server
CVE-2025-2003Same product: Devolutions Devolutions Server

References