Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-6852


Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80202298. By crafting an input buffer we can control the execution path to the point where the nt!memset function is called to zero out contents of a user-controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM.


Published

2018-07-09T18:29:00.700

Last Modified

2024-11-21T04:11:17.590

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sophos safeguard_easy_device_encryption_client 6.00 Yes
Application sophos safeguard_easy_device_encryption_client 6.10 Yes
Application sophos safeguard_easy_device_encryption_client 7.00 Yes
Application sophos safeguard_enterprise_client 5.60.3 Yes
Application sophos safeguard_enterprise_client 6.00 Yes
Application sophos safeguard_enterprise_client 6.00.1 Yes
Application sophos safeguard_enterprise_client 6.10 Yes
Application sophos safeguard_enterprise_client 7.00 Yes
Application sophos safeguard_enterprise_client 8.00 Yes
Application sophos safeguard_lan_crypt_client 3.90.1 Yes
Application sophos safeguard_lan_crypt_client 3.90.2 Yes
Application sophos safeguard_lan_crypt_client 3.95.1 Yes
Application sophos safeguard_lan_crypt_client 3.95.1 Yes

References