A security update for the Windows Infrastructure agent corrects an issue where the agent may execute privileged binaries in the system path.
Release date: October 8, 2018
Vulnerability identifier: NR18-11
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
Windows Infrastructure agent
|From 1.0.829 to 1.0.1002||1.0.1015|
The New Relic Windows Infrastructure agent may execute system commands as part of its normal operation. In affected versions of the Windows Infrastructure agent, a malicious user with permission to change the system PATH could potentially abuse this functionality to run arbitrary binaries with elevated privileges.
This vulnerability only exists on Windows systems.
This vulnerability requires existing access to the system and permission to modify the system PATH.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:
For more help
Additional documentation resources include: