top of page
perceptive_background_267k.jpg

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege…

Published:

16 March 2026 at 23:00:00

Alert date:

17 March 2026 at 19:03:08

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

A privilege escalation vulnerability exists in Wazuh versions 3.9.0 through 4.14.2 affecting the cluster synchronization protocol. The wazuh-clusterd service allows authenticated nodes to write arbitrary files with wazuh user permissions. Due to insecure default permissions, attackers can overwrite the main configuration file ossec.conf and inject malicious localfile commands. The wazuh-logcollector service running as root parses this configuration and executes the injected commands, leading to full Root Remote Code Execution. This vulnerability violates the principle of least privilege and bypasses intended security controls. Version 4.14.3 addresses this issue.

Technical details

Mitigation steps:

Affected products:

Wazuh

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page