Cloud Platform
Contact us
Asset Management
Vulnerability & Configuration Management
Risk Remediation
Threat Detection & Response
  • Overview
  • Platform Apps

  • Qualys Endpoint Security

    Advanced endpoint threat protection, improved threat context, and alert prioritization

  • Context XDR

    Extend detection and response beyond the endpoint to the enterprise

Cloud Security

Security advisory.

Possible Local Privilege Escalation of Exploitation of Qualys Cloud Agent for Mac prior to 3.7 [CVE-2023-28143]

Advisory ID: Q-PVD-2023-03
CVE ID:  CVE-2023-28143
QID:  378361
Published: 2023-04-18
CWE: CWE-362

Risk Factor

NVD Risk Rating Qualys Risk Rating
CVSSv3.1 Score TBD 6.7 / Medium
CVSSv3.1 Vector (Base) TBD CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H


Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of PKG when extraction of the package and copying files to several directories, enabling a local escalation of privilege.


Customers are advised to upgrade to v3.7 or higher of Qualys Cloud Agent for MacOS. If possible, customers should enable automatic updates.

Risk Management Considerations

Qualys has assessed the exploit and believes the risk to be low for the following reasons:

  • Exploitation requires attackers to already have gained access to the endpoint running a vulnerable version of Qualys Cloud Agent.
  • Exploitation is only possible in the moments between installation and uninstallation.
  • Exploitation has only been observed through a customer-reported proof-of-concept.


Lockheed Martin Red Team

View more security advisories