Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.00045 Percentile:
0.13693
CVSS Scoring
CVSS v3.1 Score: 7.0
Severity: HIGH
Mapped CWE(s)
CWE-362
: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-732
: Incorrect Permission Assignment for Critical Resource
All CAPEC(s)
CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs
CAPEC-122: Privilege Abuse
CAPEC-127: Directory Indexing
CAPEC-17: Using Malicious Files
CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels
CAPEC-206: Signing Malicious Code
CAPEC-234: Hijacking a privileged process
CAPEC-26: Leveraging Race Conditions
CAPEC-29: Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions