A security update for the Windows Infrastructure agent corrects an issue where the agent may execute privileged binaries in the system path.
Release date: October 8, 2018
Vulnerability identifier: NR18-11
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
Windows Infrastructure agent
|From 1.0.829 to 1.0.1002||1.0.1015|
The New Relic Windows Infrastructure agent may execute system commands as part of its normal operation. In affected versions of the Windows Infrastructure agent, a malicious user with permission to change the system PATH could potentially abuse this functionality to run arbitrary binaries with elevated privileges.
This vulnerability only exists on Windows systems.
This vulnerability requires existing access to the system and permission to modify the system PATH.
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.
For more help
Additional documentation resources include: