CVE-2020-11081
low-risk
Published 2020-07-10
osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
LOCAL
/ HIGH complexity
Affected Products (1)
Osquery
Affected Vendors
References (10)
Release Notes
https://github.com/osquery/osquery/releases/tag/4.4.0
Third Party Advisory
https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm
Release Notes
https://github.com/osquery/osquery/releases/tag/4.4.0
Third Party Advisory
https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm
19
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal