First published: Tue Dec 14 2021(Updated: )
Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629.
Credit: cve@rapid7.con cve@rapid7.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 Insight Agent | >=3.0.1<3.1.2.35 | |
>=3.0.1<3.1.2.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4007 is a vulnerability that affects Rapid7 Insight Agent versions 3.0.1 to 3.1.2.34 and allows for local privilege escalation due to an uncontrolled DLL search path.
CVE-2021-4007 has a severity score of 7.8, which is considered high.
Rapid7 Insight Agent versions 3.0.1 to 3.1.2.34 are affected by CVE-2021-4007.
Local privilege escalation can occur due to CVE-2021-4007 because when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by a non-administrative user.
To fix CVE-2021-4007, update Rapid7 Insight Agent to version 3.1.2.35 or later.