Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61667: CWE-276: Incorrect Default Permissions in DataDog datadog-agent

0
High
VulnerabilityCVE-2025-61667cvecve-2025-61667cwe-276
Published: Wed Nov 12 2025 (11/12/2025, 18:50:02 UTC)
Source: CVE Database V5
Vendor/Project: DataDog
Product: datadog-agent

Description

The Datadog Agent collects events and metrics from hosts and sends them to Datadog. A vulnerability within the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 exists due to insufficient permissions being set on the `opt/datadog-agent/python-scripts/__pycache__` directory during installation. Code in this directory is only run by the Agent during Agent install/upgrades. This could allow an attacker with local access to modify files in this directory, which would then subsequently be run when the Agent is upgraded, resulting in local privilege escalation. This issue requires local access to the host and a valid low privilege account to be vulnerable. Note that this vulnerability only impacts the Linux Host Agent. Other variations of the Agent including the container, kubernetes, windows host and other agents are not impacted. Version 7.71.0 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 11/19/2025, 20:00:06 UTC

Technical Analysis

CVE-2025-61667 is a vulnerability in the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 caused by incorrect default permissions on the directory opt/datadog-agent/python-scripts/__pycache__. This directory contains Python bytecode files executed by the agent during installation or upgrade processes. Because the directory permissions are insufficiently restrictive, a local attacker with low privileges can modify or replace files within __pycache__, which will then be executed with higher privileges during the agent upgrade. This results in local privilege escalation, allowing the attacker to gain elevated system rights. The vulnerability requires local access and a valid low-privilege account but does not require user interaction or network access. The issue is specific to the Linux Host Agent; containerized, Kubernetes, Windows, and other Datadog agent variants are unaffected. The vulnerability is tracked under CWE-276 (Incorrect Default Permissions) and has a CVSS 4.0 score of 7 (high severity). Datadog addressed this issue in version 7.71.0 by correcting the directory permissions to prevent unauthorized modifications.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where the Datadog Linux Host Agent is deployed for monitoring and observability. An attacker with local access and a low-privilege account could exploit this flaw to escalate privileges, potentially gaining root or administrative control over the host system. This could lead to unauthorized access to sensitive data, disruption of monitoring services, and further lateral movement within the network. Given the critical role of monitoring agents in infrastructure management, compromise could undermine incident detection and response capabilities. Organizations in sectors with strict regulatory requirements for data protection (e.g., finance, healthcare, critical infrastructure) could face compliance violations and reputational damage if exploited. The requirement for local access limits remote exploitation but insider threats or compromised low-privilege accounts remain a concern.

Mitigation Recommendations

European organizations should immediately upgrade all affected Datadog Linux Host Agent installations to version 7.71.0 or later, where the permission issue is resolved. Until upgrades can be performed, restrict local access to hosts running the vulnerable agent by enforcing strict access controls and monitoring for suspicious activity. Implement host-based intrusion detection systems to detect unauthorized file modifications in the datadog-agent directories. Review and harden file system permissions on the opt/datadog-agent/python-scripts/__pycache__ directory to ensure only privileged users can modify its contents. Conduct regular audits of user accounts and privileges to minimize the risk of low-privilege account compromise. Additionally, consider isolating monitoring agents on dedicated hosts or containers to limit the blast radius of potential exploits. Maintain up-to-date backups and incident response plans to quickly recover from any compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-29T20:25:16.179Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6914d9d9789e20b800721476

Added to database: 11/12/2025, 7:02:49 PM

Last enriched: 11/19/2025, 8:00:06 PM

Last updated: 11/21/2025, 6:26:44 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats