// For flags

CVE-2018-6851

 

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80206040. By crafting an input buffer we can control the execution path to the point where the constant DWORD 0 will be written to a user-controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM.

Sophos SafeGuard Enterprise en versiones anteriores a la 8.00.5, SafeGuard Easy en versiones anteriores a la 7.00.3, y SafeGuard LAN Crypt en versiones anteriores a la 3.95.2 son vulnerables a una escalada de privilegios local mediante IOCTL 0x80206040. Manipulando un búfer de entrada, es posible controlar la ruta de ejecución al punto en el que la constante DWORD 0 se escribirá en una dirección controlada por el usuario. Se puede aprovechar esta situación para eliminar el puntero al descriptor de seguridad en la cabecera del objeto de un proceso privilegiado o modificar el descriptor de seguridad en sí para ejecutar código en el contexto de un proceso que se está ejecutando como SYSTEM.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-08 CVE Reserved
  • 2018-07-04 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
6.00
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
6.10
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.10"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
7.00
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "7.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
5.60.3
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "5.60.3"
vs-nfd
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.00.1
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00.1"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.10
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.10"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
7.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "7.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
8.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "8.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.90.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.1"
ts
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.90.2
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.2"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.95.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.95.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1"
ts
Affected