Summary
In certain configurations, authenticated users with read-only API roles may retrieve agent enrollment credentials through the /utils/configuration endpoint. These credentials can be used to register new agents within the same Wazuh tenant without requiring elevated permissions through the UI.
This behavior was originally rated as high severity due to the potential for unintended agent registration. However, a thorough internal reassessment has determined that the practical impact is limited, and the behavior does not result in unauthorized access, data disclosure, or significant system disruption under standard deployment models.
Affected Component
- Endpoint:
GET /utils/configuration
- Component: Wazuh API – Agent Configuration
- Version Affected: Confirmed in v4.11.2 (Docker-based local installation)
Technical Details
Users with authenticated access and the appropriate RBAC profile may access the configuration API. This endpoint returns a JSON payload that includes the enrollment.password and enrollment.dns fields used to register agents.
Despite lacking agent:create permissions via the user interface, these credentials may be used manually to register additional agents via command-line or automation scripts.
Proof of Concept (PoC)
- Authenticate as a read-only user via API.
- Access the endpoint:
- Extract the
enrollment.password and enrollment.dns from the response.
- Use the credentials to register a new agent using standard deployment tools (e.g., Wazuh MSI installer with PowerShell).
Impact
- Confidentiality: No sensitive information is exposed through agent registration. Agents do not gain unauthorized access to internal system data by default.
- Integrity: Registration of agents changes system state in a limited, controlled way and within intended usage scenarios.
- Availability: No service disruption occurs. The system continues functioning as expected.
Mitigation
- Future versions will include enhancements to restrict access to enrollment credentials via RBAC.
- Enrollment credentials may be rotated or scoped to a time/IP window to minimize exposure.
- Review of default roles and endpoint exposure is in progress.
Recommendation
Administrators should:
- Limit access to configuration endpoints through refined RBAC settings.
- Monitor agent enrollment activity.
- Consider policies for enrollment password rotation.
Acknowledgements
We thank the researcher who responsibly reported this issue and supported its resolution.
Summary
In certain configurations, authenticated users with read-only API roles may retrieve agent enrollment credentials through the
/utils/configurationendpoint. These credentials can be used to register new agents within the same Wazuh tenant without requiring elevated permissions through the UI.This behavior was originally rated as high severity due to the potential for unintended agent registration. However, a thorough internal reassessment has determined that the practical impact is limited, and the behavior does not result in unauthorized access, data disclosure, or significant system disruption under standard deployment models.
Affected Component
GET /utils/configurationTechnical Details
Users with authenticated access and the appropriate RBAC profile may access the configuration API. This endpoint returns a JSON payload that includes the
enrollment.passwordandenrollment.dnsfields used to register agents.Despite lacking
agent:createpermissions via the user interface, these credentials may be used manually to register additional agents via command-line or automation scripts.Proof of Concept (PoC)
enrollment.passwordandenrollment.dnsfrom the response.Impact
Mitigation
Recommendation
Administrators should:
Acknowledgements
We thank the researcher who responsibly reported this issue and supported its resolution.