Cloud Platform
Contact us
Asset Management
Vulnerability & Configuration Management
Risk Remediation
Threat Detection & Response
  • Overview
  • Platform Apps

  • Qualys Endpoint Security

    Advanced endpoint threat protection, improved threat context, and alert prioritization

  • Context XDR

    Extend detection and response beyond the endpoint to the enterprise

Compliance
Cloud Security

Security advisory.

Possible NTFS Junction Exploitation on Qualys Cloud Agent for Windows prior to 4.8.0.31 [CVE-2023-28141]

Advisory ID: Q-PVD-2023-01
CVE ID:  CVE-2023-28141
QID:  378360
Published: 2023-04-18
CWE: CWE-59

Risk Factor

NVD Risk Rating Qualys Risk Rating
CVSSv3.1 Score TBD 6.7 / Medium
CVSSv3.1 Vector (Base) TBD CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H

Description

An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise take action on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally.

At the time of this disclosure, versions before 4.0 are classified as End of Life.

Solution

Customers are advised to upgrade to v4.8.0.31 or higher of Qualys Cloud Agent for Windows. If possible, customers should enable automatic updates.

Risk Management Considerations

Qualys has assessed the exploit and believes the risk to be low for the following reasons:

  • Exploitation requires attackers to already have gained access to the endpoint running a vulnerable version of Qualys Cloud Agent.
  • Exploitation is only possible in the moments between installation and uninstallation.
  • Exploitation has only been observed through a customer-reported proof-of-concept.

Acknowledgments

Lockheed Martin Red Team

View more security advisories