First published: Wed Sep 25 2024(Updated: )
Unquoted Search Path or Element vulnerability in Grafana Agent (Flow mode) on Windows allows Privilege Escalation from Local User to SYSTEM This issue affects Agent Flow: before 0.43.2
Credit: security@grafana.com security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/grafana/agent | <0.43.3 | 0.43.3 |
All of | ||
Grafana Synthetic Monitoring Agent | <0.43.2 | |
Microsoft Windows |
Uninstall Agent Flow, and then perform a clean install with version either 0.43.3 or a higher version
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8996 has a high severity rating as it allows privilege escalation from a local user to SYSTEM on Windows systems running affected versions of Grafana Agent.
To mitigate CVE-2024-8996, upgrade Grafana Agent to version 0.43.3 or later.
CVE-2024-8996 affects Grafana Agent versions before 0.43.2.
CVE-2024-8996 affects the Windows operating system when used with vulnerable versions of Grafana Agent.
Yes, local users can exploit CVE-2024-8996 to escalate their privileges to SYSTEM on Windows.