External Control of File Name or Path Affecting wazuh/wazuh package, versions [,4.8.0)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.23% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-WAZUHWAZUH-10500457
  • published25 Jun 2025
  • disclosed11 Jun 2025
  • creditRilke Petrosky Ulloa

Introduced: 11 Jun 2025

NewCVE-2024-1243  (opens in a new tab)
CWE-73  (opens in a new tab)

How to fix?

Upgrade wazuh/wazuh to version 4.8.0 or higher.

Overview

Affected versions of this package are vulnerable to External Control of File Name or Path due to improper input validation in the configuration process. An attacker with control over the Wazuh server or agent key can configure the agent to connect to a malicious UNC path, resulting in the leakage of the machine account NetNTLMv2 hash. This hash can be relayed for unauthorized actions or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks.

References

CVSS Base Scores

version 4.0
version 3.1