Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 13 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Datadoghq
Datadoghq agent Linux Linux linux |
|
| Vendors & Products |
Datadoghq
Datadoghq agent Linux Linux linux |
Thu, 13 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 12 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Datadog Agent collects events and metrics from hosts and sends them to Datadog. A vulnerability within the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 exists due to insufficient permissions being set on the `opt/datadog-agent/python-scripts/__pycache__` directory during installation. Code in this directory is only run by the Agent during Agent install/upgrades. This could allow an attacker with local access to modify files in this directory, which would then subsequently be run when the Agent is upgraded, resulting in local privilege escalation. This issue requires local access to the host and a valid low privilege account to be vulnerable. Note that this vulnerability only impacts the Linux Host Agent. Other variations of the Agent including the container, kubernetes, windows host and other agents are not impacted. Version 7.71.0 contains a patch for the issue. | |
| Title | Datadog Linux Host Agent affected by local privilege escalation due to insufficient pycache permissions | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-12T21:04:11.852Z
Reserved: 2025-09-29T20:25:16.179Z
Link: CVE-2025-61667
Updated: 2025-11-12T20:45:49.105Z
Status : Received
Published: 2025-11-12T19:15:37.193
Modified: 2025-11-12T19:15:37.193
Link: CVE-2025-61667
OpenCVE Enrichment
Updated: 2025-11-13T09:52:20Z