// For flags

CVE-2018-6693

Endpoint Security for Linux Threat Prevention (ENSLTP) privilege escalation vulnerability

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escalation to delete arbitrary files.

Un usuario sin privilegios puede eliminar archivos arbitrarios en un sistema Linux que ejecuta ENSLTP 10.5.1, 10.5.0 y 10.2.3 Hotfix 1246778 y anteriores. Mediante la explotación de una condición de carrera TOCTOU (Time-of-check to Time-of-use) durante una secuencia específica de escaneo, el usuario sin privilegios puede realizar un escalado de privilegios para eliminar archivos arbitrarios.

*Credits: RACK911Labs.com
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-06 CVE Reserved
  • 2018-09-18 CVE Published
  • 2024-08-05 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-274: Improper Handling of Insufficient Privileges
  • CWE-363: Race Condition Enabling Link Following
  • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mcafee
Search vendor "Mcafee"
Endpoint Security For Linux Threat Prevention
Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention"
<= 10.2.3
Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention" and version " <= 10.2.3"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Mcafee
Search vendor "Mcafee"
Endpoint Security For Linux Threat Prevention
Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention"
10.5.1
Search vendor "Mcafee" for product "Endpoint Security For Linux Threat Prevention" and version "10.5.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Mcafee
Search vendor "Mcafee"
Endpoint Security Linux Threat Prevention
Search vendor "Mcafee" for product "Endpoint Security Linux Threat Prevention"
10.5.0
Search vendor "Mcafee" for product "Endpoint Security Linux Threat Prevention" and version "10.5.0"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe