Security advisory.
Possible Local Privilege Escalation of Exploitation of Qualys Cloud Agent for Mac prior to 3.7 [CVE-2023-28143]
Advisory ID: | Q-PVD-2023-03 |
CVE ID: | CVE-2023-28143 |
QID: | 378361 |
Published: | 2023-04-18 |
CWE: | CWE-362 |
Risk Factor
NVD Risk Rating | Qualys Risk Rating | |
CVSSv3.1 Score | TBD | 6.7 / Medium |
CVSSv3.1 Vector (Base) | TBD | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
Description
Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of PKG when extraction of the package and copying files to several directories, enabling a local escalation of privilege.
Solution
Customers are advised to upgrade to v3.7 or higher of Qualys Cloud Agent for MacOS. If possible, customers should enable automatic updates.
Risk Management Considerations
Qualys has assessed the exploit and believes the risk to be low for the following reasons:
- Exploitation requires attackers to already have gained access to the endpoint running a vulnerable version of Qualys Cloud Agent.
- Exploitation is only possible in the moments between installation and uninstallation.
- Exploitation has only been observed through a customer-reported proof-of-concept.
Acknowledgments
Lockheed Martin Red Team