First published: Thu Aug 18 2022(Updated: )
** DISPUTED ** An issue was discovered in Qualys Cloud Agent 4.8.0-49. It writes "ps auxwwe" output to the /var/log/qualys/qualys-cloud-agent-scan.log file. This may, for example, unexpectedly write credentials (from environment variables) to disk in cleartext. NOTE: there are no common circumstances in which qualys-cloud-agent-scan.log can be read by a user other than root; however, the file contents could be exposed through site-specific operational practices. The vendor does NOT characterize this as a vulnerability because the ps data collection is intentional, and would only capture credentials on a machine that was already affected by the CWE-214 weakness.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qualys Cloud Agent | =4.8.0-49 | |
=4.8.0-49 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in Qualys Cloud Agent is CVE-2022-29550.
CVE-2022-29550 has a severity level of medium with a CVSS score of 5.5.
The affected software version of CVE-2022-29550 is Qualys Cloud Agent 4.8.0-49.
CVE-2022-29550 may write credentials (from environment variables) to disk in cleartext.
Yes, Qualys has provided security updates for the Cloud Agent on Linux to address CVE-2022-29550. It is recommended to update to the latest version available.