CVE-2018-6854
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs, e.g., 0x8810200B, 0x8810200F, 0x8810201B, 0x8810201F, 0x8810202B, 0x8810202F, 0x8810203F, 0x8810204B, 0x88102003, 0x88102007, 0x88102013, 0x88102017, 0x88102027, 0x88102033, 0x88102037, 0x88102043, and 0x88102047. When some conditions in the user-controlled input buffer are not met, the driver writes an error code (0x2000001A) to a user-controlled address. Also, note that all the aforementioned IOCTLs use transfer type METHOD_NEITHER, which means that the I/O manager does not validate any of the supplied pointers and buffer sizes. So, even though the driver checks for input/output buffer sizes, it doesn't validate if the pointers to those buffers are actually valid. So, we can supply a pointer for the output buffer to a kernel address space address, and the error code will be written there. We can take advantage of this condition to modify the SEP_TOKEN_PRIVILEGES structure of the Token object belonging to the exploit process and grant SE_DEBUG_NAME privilege. This allows the exploit process to interact with higher privileged processes running as SYSTEM and execute code in their security context.
Sophos SafeGuard Enterprise en versiones anteriores a la 8.00.5, SafeGuard Easy en versiones anteriores a la 7.00.3, y SafeGuard LAN Crypt en versiones anteriores a la 3.95.2 son vulnerables a una escalada de privilegios local mediante múltiples IOCTL. Por ejemplo: 0x8810200B, 0x8810200F, 0x8810201B, 0x8810201F, 0x8810202B, 0x8810202F, 0x8810203F, 0x8810204B, 0x88102003, 0x88102007, 0x88102013, 0x88102017, 0x88102027, 0x88102033, 0x88102037, 0x88102043 y 0x88102047. Cuando no se cumplen algunas condiciones en la entrada controlada por el usuario, el controlador escribe un código de error (0x2000001A) en una dirección controlada por el usuario. Además, se debe tener en cuenta que todos los IOCTL mencionados emplean tipos de transferencia METHOD_NEITHER, lo que significa que el gestor I/= no valida ninguno de los punteros provistos ni el tamaño de los búferes. Por ello, incluso aunque el controlador verifique el tamaño de los búferes de entrada o salida, no valida si los punteros a esos búferes son realmente válidos. Por lo tanto, podemos incluir un puntero para el búfer de salida a una dirección de espacio de dirección de kernel y el código de error se escribirá allí. Se puede aprovechar esta situación para modificar la estructura SEP_TOKEN_PRIVILEGES del objeto Token que pertenece al proceso del exploit y otorgar privilegios SE_DEBUG_NAME. Esto permite que el proceso del exploit interactúe con procesos con privilegios más elevados que se ejecutan como SYSTEM, ejecutando código en su contexto de seguridad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-02-08 CVE Reserved
- 2018-07-04 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2018/Jul/20 | Mailing List |
URL | Date | SRC |
---|---|---|
https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://community.sophos.com/kb/en-us/131934 | 2019-10-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sophos Search vendor "Sophos" | Safeguard Easy Device Encryption Client Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" | 6.00 Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.00" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Easy Device Encryption Client Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" | 6.10 Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.10" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Easy Device Encryption Client Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" | 7.00 Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "7.00" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Enterprise Client Search vendor "Sophos" for product "Safeguard Enterprise Client" | 5.60.3 Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "5.60.3" | vs-nfd |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Enterprise Client Search vendor "Sophos" for product "Safeguard Enterprise Client" | 6.00 Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Enterprise Client Search vendor "Sophos" for product "Safeguard Enterprise Client" | 6.00.1 Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00.1" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Enterprise Client Search vendor "Sophos" for product "Safeguard Enterprise Client" | 6.10 Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.10" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Enterprise Client Search vendor "Sophos" for product "Safeguard Enterprise Client" | 7.00 Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "7.00" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Enterprise Client Search vendor "Sophos" for product "Safeguard Enterprise Client" | 8.00 Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "8.00" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Lan Crypt Client Search vendor "Sophos" for product "Safeguard Lan Crypt Client" | 3.90.1 Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.1" | ts |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Lan Crypt Client Search vendor "Sophos" for product "Safeguard Lan Crypt Client" | 3.90.2 Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.2" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Lan Crypt Client Search vendor "Sophos" for product "Safeguard Lan Crypt Client" | 3.95.1 Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1" | - |
Affected
| ||||||
Sophos Search vendor "Sophos" | Safeguard Lan Crypt Client Search vendor "Sophos" for product "Safeguard Lan Crypt Client" | 3.95.1 Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1" | ts |
Affected
|