AVID-2026-R1007
Description
Vulnerability CVE-2022-26526
Details
Anaconda Anaconda3 (Anaconda Distribution) through 2021.11.0.0 and Miniconda3 through 4.11.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed.
Reason for inclusion in AVID: CVE-2022-26526 describes a privilege-escalation vulnerability in the Anaconda/Miniconda installer that can create a world-writable directory and insert it into PATH, enabling a local attacker to place a malicious file and gain privileges. Anaconda/Miniconda are widely used in AI/ML stacks to provision environments and dependencies, making this a software-supply-chain-impacting issue for general-purpose AI systems. It is a security vulnerability with practical impact and there is sufficient evidence in the report.
References
- NVD entry
- https://docs.conda.io/en/latest/miniconda.html
- https://github.com/continuumio/anaconda-issues/issues
- https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-anaconda3-and-miniconda3
- https://repo.anaconda.com/miniconda/
Affected or Relevant Artifacts
- Developer: n/a
- Deployer: n/a
- Artifact Details:
| Type | Name |
|---|---|
| System | n/a |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-03-17
- Version: 0.3.3
- AVID Entry