6.3

CVE-2025-43079

The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Mac and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerQualys Inc
Produkt Qualys Agent
Default Statusunaffected
Version < 7.2.3
Version 5.0
Status affected
HerstellerQualys Inc
Produkt Qualys Agent
Default Statusaffected
Version < 7.1.0
Version 3.12
Status affected
HerstellerQualys Inc
Produkt Qualys Agent
Default Statusaffected
Version < 6.0.0
Version 4.17
Status affected
HerstellerQualys Inc
Produkt Qualys Agent
Default Statusunaffected
Version < 6.2.1
Version 0
Status affected
HerstellerQualys Inc
Produkt Qualys Agent
Default Statusunaffected
Version < 6.3.1
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.009
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
bugreport@qualys.com 6.3 0.3 5.9
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CWE-426 Untrusted Search Path

The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.