Skip to main content

Automic Agent 24.3.0 HF4 - Privilege Escalation

High
Published: Thu May 29 2025 (05/29/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Automic Agent 24.3.0 HF4 - Privilege Escalation

AI-Powered Analysis

AILast updated: 06/11/2025, 08:11:30 UTC

Technical Analysis

The security threat concerns a privilege escalation vulnerability in Automic Agent versions prior to 24.3.0 HF4 and 21.0.13 HF1, identified as CVE-2025-4971. Automic Agent is a widely used automation software product from Broadcom, designed to manage and automate IT processes across enterprise environments. The vulnerability allows an attacker to escalate privileges on a Linux system where the vulnerable Automic Agent is installed. The exploit leverages the ability to execute a crafted shared object (.so) file with elevated privileges by manipulating the agent's configuration parameters. Specifically, the attacker generates a malicious shared object using msfvenom that executes a shell with setuid and setgid privileges, then runs the vulnerable 'ucxjlx6' executable with a custom initialization file that points to the malicious shared object as a PAM (Pluggable Authentication Module) library. This results in the execution of arbitrary code with elevated privileges, effectively granting root-level access on the affected system. The exploit does not require authentication and can be executed remotely if the attacker has access to run the 'ucxjlx6' executable or can influence its parameters. The vulnerability impacts the confidentiality, integrity, and availability of the affected systems, as attackers can gain full control, potentially leading to data theft, system manipulation, or denial of service. Although no known exploits are reported in the wild yet, the presence of public exploit code increases the risk of exploitation by malicious actors. The vulnerability affects Linux environments where Automic Agent is deployed, which are common in enterprise IT infrastructures for process automation and job scheduling.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Automic Agent in enterprise automation and IT operations. Successful exploitation can lead to complete system compromise, allowing attackers to access sensitive data, disrupt critical business processes, and move laterally within networks. This can result in operational downtime, financial losses, regulatory non-compliance (especially under GDPR), and reputational damage. Organizations in sectors such as finance, manufacturing, telecommunications, and government, which heavily rely on automation tools, are particularly vulnerable. The ability to escalate privileges without authentication and the availability of exploit code lowers the barrier for attackers, increasing the likelihood of targeted attacks or opportunistic exploitation. Additionally, the integration of Automic Agent in complex IT environments means that a compromise could cascade, affecting multiple systems and services across an organization.

Mitigation Recommendations

1. Immediate application of vendor patches or updates once available is critical, even though no patch links are currently provided. Engage with Broadcom support to obtain interim fixes or guidance. 2. Restrict access to the 'ucxjlx6' executable and related Automic Agent components using strict file permissions and access control lists to limit who can execute or modify these files. 3. Implement application whitelisting and execution control to prevent unauthorized execution of binaries and shared objects. 4. Monitor and audit usage of the Automic Agent executables and configuration files for unusual or unauthorized changes, especially focusing on PAM configuration and shared object loading. 5. Employ network segmentation to isolate systems running Automic Agent, reducing the attack surface and limiting lateral movement opportunities. 6. Use intrusion detection and prevention systems (IDS/IPS) to detect exploitation attempts, including monitoring for execution of msfvenom-generated payloads or unusual process invocations. 7. Educate system administrators and security teams about this specific vulnerability and the associated exploit techniques to improve detection and response capabilities. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions that can detect and block privilege escalation attempts in real-time.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52309
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Automic Agent 24.3.0 HF4 - Privilege Escalation

# Exploit Title: Automic Agent 24.3.0 HF4 - Privilege Escalation
# Date: 26.05.2025
# Exploit Author: Flora Schäfer
# Vendor Homepage: https://www.broadcom.com/products/software/automation/automic-automation
# Version: <24.3.0 HF4, <21.0.13 HF1
# Tested on: Linux
# CVE : CVE-2025-4971

1. Generate shared object file using msfvenom
$ msfvenom -p linux/x64/exec PrependSetuid=True PrependSetguid=True CMD="/bin/sh" -f elf-so > /tmp/sh.so

2. Run the ucxjlx6 executable as follows
$ ./ucxjlx6 ini=<(ec
... (144 more characters)
Code Length: 644 characters

Threat ID: 68489d847e6d765d51d52748

Added to database: 6/10/2025, 9:03:00 PM

Last enriched: 6/11/2025, 8:11:30 AM

Last updated: 8/4/2025, 9:00:26 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats