gfoss / CVE-2021-43326_Exploit

:boom: Automox Windows Agent Privilege Escalation Exploit

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2021-43326 Exploit

Automox Windows Agent Privilege Escalation Exploit

Lacework Labs Blog Post https://www.lacework.com/blog/cve-2021-43326/

Automox Community Post https://community.automox.com/product-updates-4/cve-2021-43326-and-cve-2021-43325-local-privilege-escalation-in-automox-agent-windows-only-1636

CVE-2021-43326 https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-43326

Instructions

Modify exploit.ps1 with the desired commands you would like to run as SYSTEM and then run the exploit.ps1 script and wait for the agent polling process to take place. This should happen every hour.

.\exploit.ps1

To manually trigger the agent polling and force automox to query the local system, modify the getOS.sh script with your organization's parameters and run the script to trigger agent polling.

chmod +x getOS.sh; ./getOS.sh

Disclaimer

Automox has patched this vulnerability - only versions 31 - 33 are susceptible to this attack. This code is only for testing purposes and can only be used where strict consent has been given. Do not use this for illegal purposes, period.

Author

greg.foss[at]owasp.org

About

:boom: Automox Windows Agent Privilege Escalation Exploit

License:Apache License 2.0


Languages

Language:PowerShell 84.7%Language:Shell 15.3%