Summary
A security update for the Windows Infrastructure agent corrects an issue where the agent may execute privileged binaries in the system path.
Release date: October 8, 2018
Vulnerability identifier: NR18-11
Priority: Medium
Affected software
The following New Relic agent versions are affected:
Name | Affected version | Notes | Remediated version |
---|---|---|---|
Windows Infrastructure agent | From 1.0.829 to 1.0.1002 | 1.0.1015 |
Vulnerability information
The New Relic Windows Infrastructure agent may execute system commands as part of its normal operation. In affected versions of the Windows Infrastructure agent, a malicious user with permission to change the system PATH could potentially abuse this functionality to run arbitrary binaries with elevated privileges.
Mitigating factors
- This vulnerability only exists on Windows systems.
- This vulnerability requires existing access to the system and permission to modify the system PATH.
Workarounds
Upgrade to the latest New Relic Windows Infrastructure agent.
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.
For more help
Additional documentation resources include: