
Cloud Vulnerability DB
A community-led vulnerabilities database
A local privilege escalation vulnerability (CVE-2021-37941) was discovered in the Elastic APM Java agent, affecting versions 1.10.0 through 1.26.0. The vulnerability was disclosed on November 18, 2021, and allows a local user to escalate privileges by attaching a malicious file to an application running with the APM Java agent (Vendor Advisory).
The vulnerability occurs when users set up the agent via the attacher CLI, the attach API, or have enabled the profilinginferredspans_enabled option. The vulnerability has a CVSS v3.1 Base Score of 7.8 HIGH (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is classified as CWE-269 (Improper Privilege Management) (NVD).
When exploited, this vulnerability allows a malicious or compromised user account to execute commands with elevated privileges beyond their assigned permissions. This could lead to unauthorized access to system resources and potential system compromise (Vendor Advisory).
Users are advised to update to version 1.27.0 or newer. Alternatively, users can employ the unaffected -javaagent-based installation method and disable the profilinginferredspans_enabled option (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."