Published Wed, Apr 20th, 2022
Platforms
The Amazon SSM Agent (used for managing EC2 instances via Amazon Systems Manager) created a world-writable sudoers file, which would have allowed local attackers to inject Sudo rules and escalate privileges to root. This could occur in certain situations involving a race condition.
SSM, EC2
Update the agent to the patched version (3.1.1208)
CVE-2022-29527
Contributed by https://github.com/mer-b
Entry Status
Finalized
Disclosure Date
Mon, Feb 28th, 2022
Exploitability Period
until 2022/04/05
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Matthias Gerstner, SUSE