CVE-2015-7359
Truecrypt 7 Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The (1) IsVolumeAccessibleByCurrentUser and (2) MountDevice methods in Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, do not check the impersonation level of impersonation tokens, which allows local users to impersonate a user at SecurityIdentify level and gain access to other users' mounted encrypted volumes.
Los métodos (1) IsVolumeAccessibleByCurrentUser y (2) MountDevice en Ntdriver.c en TrueCrypt 7.0; VeraCrypt, en versiones anteriores a la 1.15; y CipherShed, cuando se ejecutan en Windows, no comprueban el nivel de suplantación de los tokens de suplantación, lo que permite que los usuarios locales suplanten a un usuario a nivel de SecurityIdentify y obtengan acceso a los volúmenes cifrados montados de otros usuarios.
The Windows driver used by projects derived from Truecrypt 7 (verified in Veracrypt and CipherShed) are vulnerable to a local elevation of privilege attack by checking process of impersonation token which allow a user to inspect and potentially manipulate other users mounted encrypted volumes on the same machine.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-09-24 CVE Reserved
- 2015-10-06 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/133877/Truecrypt-7-Privilege-Escalation.html | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2015/09/22/7 | Mailing List | |
http://www.openwall.com/lists/oss-security/2015/09/24/3 | Issue Tracking | |
https://code.google.com/p/google-security-research/issues/detail?id=537 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://veracrypt.codeplex.com/wikipage?title=Release%20Notes | 2021-06-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ciphershed Search vendor "Ciphershed" | Ciphershed Search vendor "Ciphershed" for product "Ciphershed" | <= 0.7.5.0 Search vendor "Ciphershed" for product "Ciphershed" and version " <= 0.7.5.0" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Idrix Search vendor "Idrix" | Veracrypt Search vendor "Idrix" for product "Veracrypt" | <= 1.14 Search vendor "Idrix" for product "Veracrypt" and version " <= 1.14" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Truecrypt Search vendor "Truecrypt" | Truecrypt Search vendor "Truecrypt" for product "Truecrypt" | 7.0 Search vendor "Truecrypt" for product "Truecrypt" and version "7.0" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|