CVE-2025-61667: CWE-276: Incorrect Default Permissions in DataDog datadog-agent
The Datadog Agent collects events and metrics from hosts and sends them to Datadog. A vulnerability within the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 exists due to insufficient permissions being set on the `opt/datadog-agent/python-scripts/__pycache__` directory during installation. Code in this directory is only run by the Agent during Agent install/upgrades. This could allow an attacker with local access to modify files in this directory, which would then subsequently be run when the Agent is upgraded, resulting in local privilege escalation. This issue requires local access to the host and a valid low privilege account to be vulnerable. Note that this vulnerability only impacts the Linux Host Agent. Other variations of the Agent including the container, kubernetes, windows host and other agents are not impacted. Version 7.71.0 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-61667 is a vulnerability in the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 caused by incorrect default permissions on the directory opt/datadog-agent/python-scripts/__pycache__. This directory contains Python bytecode files executed by the agent during installation or upgrade processes. Because the directory permissions are insufficiently restrictive, a local attacker with low privileges can modify or replace files within __pycache__, which will then be executed with higher privileges during the agent upgrade. This results in local privilege escalation, allowing the attacker to gain elevated system rights. The vulnerability requires local access and a valid low-privilege account but does not require user interaction or network access. The issue is specific to the Linux Host Agent; containerized, Kubernetes, Windows, and other Datadog agent variants are unaffected. The vulnerability is tracked under CWE-276 (Incorrect Default Permissions) and has a CVSS 4.0 score of 7 (high severity). Datadog addressed this issue in version 7.71.0 by correcting the directory permissions to prevent unauthorized modifications.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where the Datadog Linux Host Agent is deployed for monitoring and observability. An attacker with local access and a low-privilege account could exploit this flaw to escalate privileges, potentially gaining root or administrative control over the host system. This could lead to unauthorized access to sensitive data, disruption of monitoring services, and further lateral movement within the network. Given the critical role of monitoring agents in infrastructure management, compromise could undermine incident detection and response capabilities. Organizations in sectors with strict regulatory requirements for data protection (e.g., finance, healthcare, critical infrastructure) could face compliance violations and reputational damage if exploited. The requirement for local access limits remote exploitation but insider threats or compromised low-privilege accounts remain a concern.
Mitigation Recommendations
European organizations should immediately upgrade all affected Datadog Linux Host Agent installations to version 7.71.0 or later, where the permission issue is resolved. Until upgrades can be performed, restrict local access to hosts running the vulnerable agent by enforcing strict access controls and monitoring for suspicious activity. Implement host-based intrusion detection systems to detect unauthorized file modifications in the datadog-agent directories. Review and harden file system permissions on the opt/datadog-agent/python-scripts/__pycache__ directory to ensure only privileged users can modify its contents. Conduct regular audits of user accounts and privileges to minimize the risk of low-privilege account compromise. Additionally, consider isolating monitoring agents on dedicated hosts or containers to limit the blast radius of potential exploits. Maintain up-to-date backups and incident response plans to quickly recover from any compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-61667: CWE-276: Incorrect Default Permissions in DataDog datadog-agent
Description
The Datadog Agent collects events and metrics from hosts and sends them to Datadog. A vulnerability within the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 exists due to insufficient permissions being set on the `opt/datadog-agent/python-scripts/__pycache__` directory during installation. Code in this directory is only run by the Agent during Agent install/upgrades. This could allow an attacker with local access to modify files in this directory, which would then subsequently be run when the Agent is upgraded, resulting in local privilege escalation. This issue requires local access to the host and a valid low privilege account to be vulnerable. Note that this vulnerability only impacts the Linux Host Agent. Other variations of the Agent including the container, kubernetes, windows host and other agents are not impacted. Version 7.71.0 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-61667 is a vulnerability in the Datadog Linux Host Agent versions 7.65.0 through 7.70.2 caused by incorrect default permissions on the directory opt/datadog-agent/python-scripts/__pycache__. This directory contains Python bytecode files executed by the agent during installation or upgrade processes. Because the directory permissions are insufficiently restrictive, a local attacker with low privileges can modify or replace files within __pycache__, which will then be executed with higher privileges during the agent upgrade. This results in local privilege escalation, allowing the attacker to gain elevated system rights. The vulnerability requires local access and a valid low-privilege account but does not require user interaction or network access. The issue is specific to the Linux Host Agent; containerized, Kubernetes, Windows, and other Datadog agent variants are unaffected. The vulnerability is tracked under CWE-276 (Incorrect Default Permissions) and has a CVSS 4.0 score of 7 (high severity). Datadog addressed this issue in version 7.71.0 by correcting the directory permissions to prevent unauthorized modifications.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where the Datadog Linux Host Agent is deployed for monitoring and observability. An attacker with local access and a low-privilege account could exploit this flaw to escalate privileges, potentially gaining root or administrative control over the host system. This could lead to unauthorized access to sensitive data, disruption of monitoring services, and further lateral movement within the network. Given the critical role of monitoring agents in infrastructure management, compromise could undermine incident detection and response capabilities. Organizations in sectors with strict regulatory requirements for data protection (e.g., finance, healthcare, critical infrastructure) could face compliance violations and reputational damage if exploited. The requirement for local access limits remote exploitation but insider threats or compromised low-privilege accounts remain a concern.
Mitigation Recommendations
European organizations should immediately upgrade all affected Datadog Linux Host Agent installations to version 7.71.0 or later, where the permission issue is resolved. Until upgrades can be performed, restrict local access to hosts running the vulnerable agent by enforcing strict access controls and monitoring for suspicious activity. Implement host-based intrusion detection systems to detect unauthorized file modifications in the datadog-agent directories. Review and harden file system permissions on the opt/datadog-agent/python-scripts/__pycache__ directory to ensure only privileged users can modify its contents. Conduct regular audits of user accounts and privileges to minimize the risk of low-privilege account compromise. Additionally, consider isolating monitoring agents on dedicated hosts or containers to limit the blast radius of potential exploits. Maintain up-to-date backups and incident response plans to quickly recover from any compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-29T20:25:16.179Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6914d9d9789e20b800721476
Added to database: 11/12/2025, 7:02:49 PM
Last enriched: 11/19/2025, 8:00:06 PM
Last updated: 11/21/2025, 6:26:44 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13499: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark
HighCVE-2023-32251: Improper Restriction of Excessive Authentication Attempts
LowCVE-2025-12169: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2025-12085: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2025-12023: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.