// For flags

CVE-2022-33915

 

Severity Score

7.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Versions of the Amazon AWS Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.3.5 are affected by a race condition that could lead to a local privilege escalation. This Hotpatch package is not a replacement for updating to a log4j version that mitigates CVE-2021-44228 or CVE-2021-45046; it provides a temporary mitigation to CVE-2021-44228 by hotpatching the local Java virtual machines. To do so, it iterates through all running Java processes, performs several checks, and executes the Java virtual machine with the same permissions and capabilities as the running process to load the hotpatch. A local user could cause the hotpatch script to execute a binary with elevated privileges by running a custom java process that performs exec() of an SUID binary after the hotpatch has observed the process path and before it has observed its effective user ID.

Las versiones del paquete hotpatch de Amazon AWS Apache Log4j anteriores a log4j-cve-2021-44228-hotpatch-1.3.5, están afectadas por una condición de carrera que podría conllevar a una escalada de privilegios local. Este paquete Hotpatch no sustituye a la actualización a una versión de log4j que mitigue la CVE-2021-44228 o la CVE-2021-45046; proporciona una mitigación temporal de la CVE-2021-44228 mediante la aplicación de parches en caliente a las máquinas virtuales Java locales. Para ello, recorre todos los procesos Java en ejecución, lleva a cabo varias comprobaciones y ejecuta la máquina virtual Java con los mismos permisos y capacidades que el proceso en ejecución para cargar el hotpatch. Un usuario local podría causar que el script del hotpatch ejecute un binario con altos privilegios al ejecutar un proceso java personalizado que lleve a cabo exec() de un binario SUID después de que el hotpatch haya observado la ruta del proceso y antes de que haya observado su ID de usuario efectivo

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-17 CVE Reserved
  • 2022-06-17 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amazon
Search vendor "Amazon"
Hotpatch
Search vendor "Amazon" for product "Hotpatch"
< 1.3.5
Search vendor "Amazon" for product "Hotpatch" and version " < 1.3.5"
log4j
Affected