No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://devolutions.net/security/advisories/DEVO-2026-0008 |
|
Thu, 19 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ironmansoftware
Ironmansoftware powershell Universal |
|
| CPEs | cpe:2.3:a:ironmansoftware:powershell_universal:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ironmansoftware
Ironmansoftware powershell Universal |
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Devolutions
Devolutions powershell Universal |
|
| Vendors & Products |
Devolutions
Devolutions powershell Universal |
Tue, 17 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 17 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading sensitive data, creating or deleting resources, and disrupting service operations — via crafted gRPC requests. | |
| Weaknesses | CWE-862 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: DEVOLUTIONS
Published:
Updated: 2026-03-17T20:03:19.106Z
Reserved: 2026-03-12T17:37:00.624Z
Link: CVE-2026-4064
Updated: 2026-03-17T20:03:12.507Z
Status : Analyzed
Published: 2026-03-17T20:16:14.717
Modified: 2026-03-19T13:03:28.320
Link: CVE-2026-4064
No data.
OpenCVE Enrichment
Updated: 2026-03-18T10:42:53Z