Home ยป Database

AVID-2026-R1007

Description

Vulnerability CVE-2022-26526

Details

Anaconda Anaconda3 (Anaconda Distribution) through 2021.11.0.0 and Miniconda3 through 4.11.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed.

Reason for inclusion in AVID: CVE-2022-26526 describes a privilege-escalation vulnerability in the Anaconda/Miniconda installer that can create a world-writable directory and insert it into PATH, enabling a local attacker to place a malicious file and gain privileges. Anaconda/Miniconda are widely used in AI/ML stacks to provision environments and dependencies, making this a software-supply-chain-impacting issue for general-purpose AI systems. It is a security vulnerability with practical impact and there is sufficient evidence in the report.

References

Affected or Relevant Artifacts

  • Developer: n/a
  • Deployer: n/a
  • Artifact Details:
TypeName
Systemn/a

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-03-17
  • Version: 0.3.3
  • AVID Entry