Arbitrary Command Execution Vulnerability in Wazuh by Open Source Vendor
CVE-2023-50260

8.8HIGH

Key Information:

Vendor

Wazuh

Status
Vendor
CVE Published:
19 April 2024

What is CVE-2023-50260?

An improper validation flaw within the host_deny script of Wazuh enables attackers to inject arbitrary commands into the /etc/hosts.deny file. This vulnerability exploits the active response feature, which allows automated actions based on alerts. By manipulating the host_deny script, an attacker can execute unauthorized commands with root privileges on both the server and agent systems. The issue is present in Wazuh versions up to 4.7.1 and has been resolved in version 4.7.2. Organizations using affected versions should take immediate action to mitigate potential risks from this vulnerability.

References

EPSS Score

15% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.
CVE-2023-50260 : Arbitrary Command Execution Vulnerability in Wazuh by Open Source Vendor