CVE-2025-43079

MEDIUM

Qualys Cloud Agent - Command Injection

Title source: llm
STIX 2.1

Description

The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Mac and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.

Scores

CVSS v3 6.3
EPSS 0.0000
EPSS Percentile 0.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-426
Status published
Products (11)
Qualys Inc/Qualys Agent < 3.21.1-6
Qualys Inc/Qualys Agent < 3.31.1-8
Qualys Inc/Qualys Agent < 4.2.6
Qualys Inc/Qualys Agent < 5.0.2
Qualys Inc/Qualys Agent < 5.0.3
Qualys Inc/Qualys Agent < 6.0.3
Qualys Inc/Qualys Agent < 6.2.1
Qualys Inc/Qualys Agent < 6.3.1
Qualys Inc/Qualys Agent 3.12 - 7.1.0
Qualys Inc/Qualys Agent 4.17 - 6.0.0
... and 1 more
Published Nov 10, 2025
Tracked Since Feb 18, 2026