CVE-2025-43079 (GCVE-0-2025-43079)

Vulnerability from cvelistv5 – Published: 2025-11-10 17:10 – Updated: 2025-11-18 11:41
VLAI?
Summary
The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Mac and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.
CWE
Assigner
Impacted products
Vendor Product Version
Qualys Inc Qualys Agent Affected: 5.0 , < 7.2.3 (custom)
Create a notification for this product.
Credits
Brent Zaltsman (AfricanHipp0)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-43079",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-10T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-11T04:55:38.551Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Qualys Agent",
          "vendor": "Qualys Inc",
          "versions": [
            {
              "lessThan": "7.2.3",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "BSD"
          ],
          "product": "Qualys Agent",
          "vendor": "Qualys Inc",
          "versions": [
            {
              "lessThan": "7.1.0",
              "status": "affected",
              "version": "3.12",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "IMB AIX"
          ],
          "product": "Qualys Agent",
          "vendor": "Qualys Inc",
          "versions": [
            {
              "lessThan": "6.0.0",
              "status": "affected",
              "version": "4.17",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS",
            "x86",
            "64 bit"
          ],
          "product": "Qualys Agent",
          "vendor": "Qualys Inc",
          "versions": [
            {
              "lessThan": "6.2.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS (M Series Silicon CPU)"
          ],
          "product": "Qualys Agent",
          "vendor": "Qualys Inc",
          "versions": [
            {
              "lessThan": "6.3.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cdiv\u003e\u003col\u003e\u003cli\u003e\u003cp\u003eLocal access to the system (the attacker must be local).\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eAbility to run sudo or root (the uninstall script requires sudo at minimum for execution or must be run as root).\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eAbility to modify $PATH (temporarily in the shell session used to launch the uninstall script, or persistently via writable shell configuration files such as ~/.bashrc, ~/.zshrc).\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eExecution of qagent_uninstall.sh within the compromised environment where $PATH points to attacker-controlled locations.\u003c/p\u003e\u003c/li\u003e\u003c/ol\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cp\u003eBecause exploitation requires the ability to run sudo (or be root), the vulnerability is not remotely exploitable by default \u2014 it relies on local privilege and environment manipulation, but the consequences are elevated (execution under high privilege). \u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "*  Local access to the system (the attacker must be local).\n\n\n  *  Ability to run sudo or root (the uninstall script requires sudo at minimum for execution or must be run as root).\n\n\n  *  Ability to modify $PATH (temporarily in the shell session used to launch the uninstall script, or persistently via writable shell configuration files such as ~/.bashrc, ~/.zshrc).\n\n\n  *  Execution of qagent_uninstall.sh within the compromised environment where $PATH points to attacker-controlled locations.\n\n\n\n\n\n\nBecause exploitation requires the ability to run sudo (or be root), the vulnerability is not remotely exploitable by default \u2014 it relies on local privilege and environment manipulation, but the consequences are elevated (execution under high privilege)."
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Brent Zaltsman (AfricanHipp0)"
        }
      ],
      "datePublic": "2025-11-10T16:32:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Qualys Cloud Agent included a bundled uninstall script (\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eqagent_uninstall.sh\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e), specific to Mac and Linux supported versions that invoked multiple system commands \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ewithout using absolute paths and without sanitizing the \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e$PATH\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e environment\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. If the uninstall script is executed with elevated privileges (e.g., via \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003esudo\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e) in an environment where \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e$PATH\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e has been manipulated, an attacker with \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eroot\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e/\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003esudo\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e"
            }
          ],
          "value": "The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Mac and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "CWE-426 Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T11:41:11.636Z",
        "orgId": "8a309ac4-d8c7-4735-9c1d-ca39c5dfbcda",
        "shortName": "Qualys"
      },
      "references": [
        {
          "url": "https://www.qualys.com/security-advisories/cve-2025-43079"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCustomers are advised to update to non-affected versions of Qualys product\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e"
            }
          ],
          "value": "Customers are advised to update to non-affected versions of Qualys product."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Local Privilege Escalation via qagent_uninstall.sh Qualys Cloud Agents",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Customers are advised to check workaround solutions listed on\u0026nbsp;\n\n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.qualys.com/security-advisories/cve-2025-43079\"\u003ehttps://www.qualys.com/security-advisories/cve-2025-43079\u003c/a\u003e"
            }
          ],
          "value": "Customers are advised to check workaround solutions listed on\u00a0\n\n https://www.qualys.com/security-advisories/cve-2025-43079"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8a309ac4-d8c7-4735-9c1d-ca39c5dfbcda",
    "assignerShortName": "Qualys",
    "cveId": "CVE-2025-43079",
    "datePublished": "2025-11-10T17:10:31.066Z",
    "dateReserved": "2025-04-16T14:43:29.660Z",
    "dateUpdated": "2025-11-18T11:41:11.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-43079\",\"sourceIdentifier\":\"bugreport@qualys.com\",\"published\":\"2025-11-10T18:16:06.420\",\"lastModified\":\"2025-11-18T12:15:46.247\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Mac and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"bugreport@qualys.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.3,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"bugreport@qualys.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-426\"}]}],\"references\":[{\"url\":\"https://www.qualys.com/security-advisories/cve-2025-43079\",\"source\":\"bugreport@qualys.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-43079\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-10T18:37:03.362646Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-10T18:37:08.243Z\"}}], \"cna\": {\"title\": \"Local Privilege Escalation via qagent_uninstall.sh Qualys Cloud Agents\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Brent Zaltsman (AfricanHipp0)\"}], \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Qualys Inc\", \"product\": \"Qualys Agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0\", \"lessThan\": \"7.2.3\", \"versionType\": \"custom\"}], \"platforms\": [\"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Qualys Inc\", \"product\": \"Qualys Agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.12\", \"lessThan\": \"7.1.0\", \"versionType\": \"custom\"}], \"platforms\": [\"BSD\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"Qualys Inc\", \"product\": \"Qualys Agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.17\", \"lessThan\": \"6.0.0\", \"versionType\": \"custom\"}], \"platforms\": [\"IMB AIX\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"Qualys Inc\", \"product\": \"Qualys Agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"6.2.1\", \"versionType\": \"custom\"}], \"platforms\": [\"MacOS\", \"x86\", \"64 bit\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Qualys Inc\", \"product\": \"Qualys Agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"6.3.1\", \"versionType\": \"custom\"}], \"platforms\": [\"MacOS (M Series Silicon CPU)\"], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Customers are advised to update to non-affected versions of Qualys product.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eCustomers are advised to update to non-affected versions of Qualys product\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e. \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;\u003c/span\u003e\", \"base64\": false}]}], \"datePublic\": \"2025-11-10T16:32:00.000Z\", \"references\": [{\"url\": \"https://www.qualys.com/security-advisories/cve-2025-43079\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Customers are advised to check workaround solutions listed on\\u00a0\\n\\n https://www.qualys.com/security-advisories/cve-2025-43079\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Customers are advised to check workaround solutions listed on\u0026nbsp;\\n\\n\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.qualys.com/security-advisories/cve-2025-43079\\\"\u003ehttps://www.qualys.com/security-advisories/cve-2025-43079\u003c/a\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Mac and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eThe Qualys Cloud Agent included a bundled uninstall script (\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eqagent_uninstall.sh\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e), specific to Mac and Linux supported versions that invoked multiple system commands \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003ewithout using absolute paths and without sanitizing the \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e$PATH\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e environment\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e. If the uninstall script is executed with elevated privileges (e.g., via \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003esudo\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e) in an environment where \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e$PATH\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e has been manipulated, an attacker with \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eroot\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e/\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003esudo\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-426\", \"description\": \"CWE-426 Untrusted Search Path\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"*  Local access to the system (the attacker must be local).\\n\\n\\n  *  Ability to run sudo or root (the uninstall script requires sudo at minimum for execution or must be run as root).\\n\\n\\n  *  Ability to modify $PATH (temporarily in the shell session used to launch the uninstall script, or persistently via writable shell configuration files such as ~/.bashrc, ~/.zshrc).\\n\\n\\n  *  Execution of qagent_uninstall.sh within the compromised environment where $PATH points to attacker-controlled locations.\\n\\n\\n\\n\\n\\n\\nBecause exploitation requires the ability to run sudo (or be root), the vulnerability is not remotely exploitable by default \\u2014 it relies on local privilege and environment manipulation, but the consequences are elevated (execution under high privilege).\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cdiv\u003e\u003cdiv\u003e\u003col\u003e\u003cli\u003e\u003cp\u003eLocal access to the system (the attacker must be local).\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eAbility to run sudo or root (the uninstall script requires sudo at minimum for execution or must be run as root).\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eAbility to modify $PATH (temporarily in the shell session used to launch the uninstall script, or persistently via writable shell configuration files such as ~/.bashrc, ~/.zshrc).\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eExecution of qagent_uninstall.sh within the compromised environment where $PATH points to attacker-controlled locations.\u003c/p\u003e\u003c/li\u003e\u003c/ol\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cp\u003eBecause exploitation requires the ability to run sudo (or be root), the vulnerability is not remotely exploitable by default \\u2014 it relies on local privilege and environment manipulation, but the consequences are elevated (execution under high privilege). \u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"8a309ac4-d8c7-4735-9c1d-ca39c5dfbcda\", \"shortName\": \"Qualys\", \"dateUpdated\": \"2025-11-18T11:41:11.636Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-43079\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-18T11:41:11.636Z\", \"dateReserved\": \"2025-04-16T14:43:29.660Z\", \"assignerOrgId\": \"8a309ac4-d8c7-4735-9c1d-ca39c5dfbcda\", \"datePublished\": \"2025-11-10T17:10:31.066Z\", \"assignerShortName\": \"Qualys\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…