Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j8x2-2m5w-j939

Опубликовано: 12 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

Amazon CloudWatch Agent for Windows has Privilege Escalation Vector

Impact

A privilege escalation issue exists within the Amazon CloudWatch Agent for Windows in versions up to and including v1.247354. When users trigger a repair of the Agent, a pop-up window opens with SYSTEM permissions. Users with administrative access to affected hosts may use this to create a new command prompt as NT AUTHORITY\SYSTEM.

To trigger this issue, the third party must be able to access the affected host and elevate their privileges such that they’re able to trigger the agent repair process. They must also be able to install the tools required to trigger the issue.

This issue does not affect the CloudWatch Agent for macOS or Linux.

Patches

Maintainers recommend that Agent users upgrade to the latest available version of the CloudWatch Agent to address this issue.

Workarounds

There is no recommended work around. Affected users must update the installed version of the CloudWatch Agent to address this issue.

References

https://github.com/aws/amazon-cloudwatch-agent/commit/6119858864c317ff26f41f576c169148d1250837

For more information

If you have any questions or comments about this advisory, contact AWS/Amazon Security via their vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.

Пакеты

Наименование

github.com/aws/amazon-cloudwatch-agent

go
Затронутые версииВерсия исправления

< 1.247355.0

1.247355.0

EPSS

Процентиль: 48%
0.00252
Низкий

7.1 High

CVSS3

Дефекты

CWE-274

Связанные уязвимости

CVSS3: 7.1
nvd
около 3 лет назад

A privilege escalation issue exists within the Amazon CloudWatch Agent for Windows, software for collecting metrics and logs from Amazon EC2 instances and on-premises servers, in versions up to and including v1.247354. When users trigger a repair of the Agent, a pop-up window opens with SYSTEM permissions. Users with administrative access to affected hosts may use this to create a new command prompt as NT AUTHORITY\SYSTEM. To trigger this issue, the third party must be able to access the affected host and elevate their privileges such that they're able to trigger the agent repair process. They must also be able to install the tools required to trigger the issue. This issue does not affect the CloudWatch Agent for macOS or Linux. Agent users should upgrade to version 1.247355 of the CloudWatch Agent to address this issue. There is no recommended work around. Affected users must update the installed version of the CloudWatch Agent to address this issue.

EPSS

Процентиль: 48%
0.00252
Низкий

7.1 High

CVSS3

Дефекты

CWE-274