First published: Thu Nov 29 2018(Updated: )
The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OSSEC | <=3.1.0 | |
Microsoft Windows Operating System | ||
Wazuh | >=1.0.0<=2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19666 is rated as a critical vulnerability due to the potential for local users to gain NT AUTHORITY\SYSTEM access.
To mitigate CVE-2018-19666, you should upgrade OSSEC to version 3.2.0 or later.
CVE-2018-19666 affects local users on Windows systems running OSSEC versions up to and including 3.1.0.
CVE-2018-19666 can be exploited through a directory traversal attack to gain elevated system privileges.
Yes, CVE-2018-19666 affects versions of the Wazuh agent from 1.0.0 to 2.1.1.