Skip to content

gfoss/CVE-2021-43326_Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2021-43326 Exploit

Automox Windows Agent Privilege Escalation Exploit

Lacework Labs Blog Post https://www.lacework.com/blog/cve-2021-43326/

Automox Community Post https://community.automox.com/product-updates-4/cve-2021-43326-and-cve-2021-43325-local-privilege-escalation-in-automox-agent-windows-only-1636

CVE-2021-43326 https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-43326

Instructions

Modify exploit.ps1 with the desired commands you would like to run as SYSTEM and then run the exploit.ps1 script and wait for the agent polling process to take place. This should happen every hour.

.\exploit.ps1

To manually trigger the agent polling and force automox to query the local system, modify the getOS.sh script with your organization's parameters and run the script to trigger agent polling.

chmod +x getOS.sh; ./getOS.sh

Disclaimer

Automox has patched this vulnerability - only versions 31 - 33 are susceptible to this attack. This code is only for testing purposes and can only be used where strict consent has been given. Do not use this for illegal purposes, period.

Author

greg.foss[at]owasp.org

About

💥 Automox Windows Agent Privilege Escalation Exploit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published