The Datadog Agent collects events and metrics from hosts and sends them to Datadog. A vulnerability within the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 exists due to insufficient permissions being set on the `opt/datadog-agent/python-scripts/__pycache__` directory during installation. Code in this directory is only run by the Agent during Agent install/upgrades. This could allow an attacker with local access to modify files in this directory, which would then subsequently be run when the Agent is upgraded, resulting in local privilege escalation. This issue requires local access to the host and a valid low privilege account to be vulnerable. Note that this vulnerability only impacts the Linux Host Agent. Other variations of the Agent including the container, kubernetes, windows host and other agents are not impacted. Version 7.71.0 contains a patch for the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Nov 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Datadoghq
Datadoghq agent
Linux
Linux linux
Vendors & Products Datadoghq
Datadoghq agent
Linux
Linux linux

Thu, 13 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}

threat_severity

Important


Wed, 12 Nov 2025 19:00:00 +0000

Type Values Removed Values Added
Description The Datadog Agent collects events and metrics from hosts and sends them to Datadog. A vulnerability within the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 exists due to insufficient permissions being set on the `opt/datadog-agent/python-scripts/__pycache__` directory during installation. Code in this directory is only run by the Agent during Agent install/upgrades. This could allow an attacker with local access to modify files in this directory, which would then subsequently be run when the Agent is upgraded, resulting in local privilege escalation. This issue requires local access to the host and a valid low privilege account to be vulnerable. Note that this vulnerability only impacts the Linux Host Agent. Other variations of the Agent including the container, kubernetes, windows host and other agents are not impacted. Version 7.71.0 contains a patch for the issue.
Title Datadog Linux Host Agent affected by local privilege escalation due to insufficient pycache permissions
Weaknesses CWE-276
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-12T21:04:11.852Z

Reserved: 2025-09-29T20:25:16.179Z

Link: CVE-2025-61667

cve-icon Vulnrichment

Updated: 2025-11-12T20:45:49.105Z

cve-icon NVD

Status : Received

Published: 2025-11-12T19:15:37.193

Modified: 2025-11-12T19:15:37.193

Link: CVE-2025-61667

cve-icon Redhat

Severity : Important

Publid Date: 2025-11-12T18:50:02Z

Links: CVE-2025-61667 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-11-13T09:52:20Z