Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-6853


Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80206024. By crafting an input buffer we can control the execution path to the point where a global variable will be written to a user controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM.


Published

2018-07-09T18:29:00.747

Last Modified

2024-11-21T04:11:17.737

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sophos safeguard_easy_device_encryption_client 6.00 Yes
Application sophos safeguard_easy_device_encryption_client 6.10 Yes
Application sophos safeguard_easy_device_encryption_client 7.00 Yes
Application sophos safeguard_enterprise_client 5.60.3 Yes
Application sophos safeguard_enterprise_client 6.00 Yes
Application sophos safeguard_enterprise_client 6.00.1 Yes
Application sophos safeguard_enterprise_client 6.10 Yes
Application sophos safeguard_enterprise_client 7.00 Yes
Application sophos safeguard_enterprise_client 8.00 Yes
Application sophos safeguard_lan_crypt_client 3.90.1 Yes
Application sophos safeguard_lan_crypt_client 3.90.2 Yes
Application sophos safeguard_lan_crypt_client 3.95.1 Yes
Application sophos safeguard_lan_crypt_client 3.95.1 Yes

References