CVE-2018-6693
Endpoint Security for Linux Threat Prevention (ENSLTP) privilege escalation vulnerability
Severity Score
5.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escalation to delete arbitrary files.
Un usuario sin privilegios puede eliminar archivos arbitrarios en un sistema Linux que ejecuta ENSLTP 10.5.1, 10.5.0 y 10.2.3 Hotfix 1246778 y anteriores. Mediante la explotación de una condición de carrera TOCTOU (Time-of-check to Time-of-use) durante una secuencia específica de escaneo, el usuario sin privilegios puede realizar un escalado de privilegios para eliminar archivos arbitrarios.
*Credits:
RACK911Labs.com
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-02-06 CVE Reserved
- 2018-09-18 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-274: Improper Handling of Insufficient Privileges
- CWE-363: Race Condition Enabling Link Following
- CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://kc.mcafee.com/corporate/index?page=content&id=SB10248 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mcafee Search vendor "Mcafee" | Endpoint Security For Linux Threat Prevention Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention" | <= 10.2.3 Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention" and version " <= 10.2.3" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Mcafee Search vendor "Mcafee" | Endpoint Security For Linux Threat Prevention Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention" | 10.5.1 Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention" and version "10.5.1" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Mcafee Search vendor "Mcafee" | Endpoint Security Linux Threat Prevention Search vendor "Mcafee" for product "Endpoint Security Linux Threat Prevention" | 10.5.0 Search vendor "Mcafee" for product "Endpoint Security Linux Threat Prevention" and version "10.5.0" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|