A security update for the Windows Infrastructure agent corrects an issue where the agent may execute privileged binaries in the system path.
Release date: October 8, 2018
Vulnerability identifier: NR18-11
The following New Relic agent versions are affected:
Windows Infrastructure agent
From 1.0.829 to 1.0.1002
The New Relic Windows Infrastructure agent may execute system commands as part of its normal operation. In affected versions of the Windows Infrastructure agent, a malicious user with permission to change the system PATH could potentially abuse this functionality to run arbitrary binaries with elevated privileges.
- This vulnerability only exists on Windows systems.
- This vulnerability requires existing access to the system and permission to modify the system PATH.
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.
Additional documentation resources include: