Wiz Agents & Workflows are here

CVE-2019-3567
OSQuery vulnerability analysis and mitigation

In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.


SourceNVD

Related OSQuery vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2020-1887CRITICAL9.1
  • OSQueryOSQuery
  • osquery
NoYesMar 13, 2020
CVE-2020-11081HIGH8.2
  • OSQueryOSQuery
  • osquery
NoYesJul 10, 2020
CVE-2019-3567HIGH8.1
  • OSQueryOSQuery
  • cpe:2.3:a:linuxfoundation:osquery
NoYesJun 03, 2019
CVE-2018-6336HIGH7.8
  • OSQueryOSQuery
  • cpe:2.3:a:linuxfoundation:osquery
NoYesDec 31, 2018
CVE-2020-26273MEDIUM5.2
  • OSQueryOSQuery
  • cpe:2.3:a:linuxfoundation:osquery
NoYesDec 16, 2020

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management