
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity security vulnerability (CVE-2024-32019) has been discovered in Netdata, a widely used open-source monitoring and troubleshooting tool. The vulnerability exists in the ndsudo
tool shipped with affected versions of the Netdata Agent (versions >= v1.45.0, < v1.45.3, and >= v1.44.0-60, < v1.45.0-169). The flaw has been assigned a CVSS score of 8.8 (High) and was disclosed on April 12, 2024 (GitHub Advisory).
The vulnerability lies in the ndsudo
tool, which is packaged as a root-owned executable with the SUID bit set. While the tool is designed to run only a restricted set of external commands, it relies on the PATH
environment variable for its search paths. This implementation flaw allows an attacker to control where ndsudo
looks for these commands, potentially directing it to a path where the attacker has write access (GitHub Advisory).
Successful exploitation of this vulnerability could allow an attacker to gain root-level privileges on affected systems, effectively achieving local privilege escalation. This means attackers could potentially execute arbitrary programs with root permissions, giving them full control over the affected system (Security Online).
The vulnerability has been patched in Netdata versions 1.45.3 and 1.45.2-169. Users are strongly advised to upgrade to these patched versions immediately. There are no known workarounds for this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."