top of page
perceptive_background_267k.jpg

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege…

Published:

16 maart 2026 om 23:00:00

Alert date:

17 maart 2026 om 19:03:08

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

A privilege escalation vulnerability exists in Wazuh versions 3.9.0 through 4.14.2 affecting the cluster synchronization protocol. The wazuh-clusterd service allows authenticated nodes to write arbitrary files with wazuh user permissions. Due to insecure default permissions, attackers can overwrite the main configuration file ossec.conf and inject malicious localfile commands. The wazuh-logcollector service running as root parses this configuration and executes the injected commands, leading to full Root Remote Code Execution. This vulnerability violates the principle of least privilege and bypasses intended security controls. Version 4.14.3 addresses this issue.

Technical details

Mitigation steps:

Affected products:

Wazuh

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page