CVE-2022-23511: Amazon CloudWatch Agent for Windows has Privilege Escalation Vector
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.08311%
CWE
Published
12/12/2022
Updated
4/3/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/aws/amazon-cloudwatch-agent | go | < 1.247355.0 | 1.247355.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how the Windows installer (MSI) handled privilege elevation during repairs. The commit diff shows the vulnerable version used a direct PowerShell execution command (UpdateConfigPermission) with 'Impersonate="no"', granting SYSTEM privileges but displaying a visible window. The patched version replaces this with WixQuietExec and proper PowerShell path resolution to prevent UI interaction. This specific CustomAction implementation in the installer configuration was the root cause of the privilege escalation vector.