Real-time monitoring, troubleshooting, and remediation
VDI & DaaS Monitoring VDI & DaaS Availability TestingLocal and remote physical endpoint devices and apps monitoring
Physical Endpoint Monitoring SaaS & Web Apps Availability Testing Unified CommunicationsPlatform integrations for ControlUp monitoring solutions
ControlUp Blog
Explore expert insights, tips, and best practices to optimize your IT operations
Read nowThis document addresses Privilege Escalation vulnerability (CVE-2022-27905) in the Controlup Real-Time Agent.
A local privilege escalation may be possible due to an insecure call to the CreateProcessAsUserA (Unquoted path) WinAPI function while the ControlUp Real-Time Agent is running.
The prerequisites for exploiting this vulnerability are very uncommon and include write access to C:\ by a low-privilege user and the ability to restart the cuAgent service.
We advise you to do the following:
It is important to update/uninstall all ControlUp Real-Time Agents even if they are no longer in use. You can watch this 2-minute video to learn how to easily find machines with older ControlUp Real-Time Agent versions.