First published: Wed Apr 20 2022(Updated: )
Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Amazon Ssm Agent | <3.1.1208.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-29527.
The severity level of CVE-2022-29527 is high.
The affected software is Amazon Amazon Ssm Agent version up to 3.1.1208.0.
Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.
To fix this vulnerability, update the affected Amazon Ssm Agent software to version 3.1.1208.0 or higher.