// For flags

CVE-2018-6854

 

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs, e.g., 0x8810200B, 0x8810200F, 0x8810201B, 0x8810201F, 0x8810202B, 0x8810202F, 0x8810203F, 0x8810204B, 0x88102003, 0x88102007, 0x88102013, 0x88102017, 0x88102027, 0x88102033, 0x88102037, 0x88102043, and 0x88102047. When some conditions in the user-controlled input buffer are not met, the driver writes an error code (0x2000001A) to a user-controlled address. Also, note that all the aforementioned IOCTLs use transfer type METHOD_NEITHER, which means that the I/O manager does not validate any of the supplied pointers and buffer sizes. So, even though the driver checks for input/output buffer sizes, it doesn't validate if the pointers to those buffers are actually valid. So, we can supply a pointer for the output buffer to a kernel address space address, and the error code will be written there. We can take advantage of this condition to modify the SEP_TOKEN_PRIVILEGES structure of the Token object belonging to the exploit process and grant SE_DEBUG_NAME privilege. This allows the exploit process to interact with higher privileged processes running as SYSTEM and execute code in their security context.

Sophos SafeGuard Enterprise en versiones anteriores a la 8.00.5, SafeGuard Easy en versiones anteriores a la 7.00.3, y SafeGuard LAN Crypt en versiones anteriores a la 3.95.2 son vulnerables a una escalada de privilegios local mediante múltiples IOCTL. Por ejemplo: 0x8810200B, 0x8810200F, 0x8810201B, 0x8810201F, 0x8810202B, 0x8810202F, 0x8810203F, 0x8810204B, 0x88102003, 0x88102007, 0x88102013, 0x88102017, 0x88102027, 0x88102033, 0x88102037, 0x88102043 y 0x88102047. Cuando no se cumplen algunas condiciones en la entrada controlada por el usuario, el controlador escribe un código de error (0x2000001A) en una dirección controlada por el usuario. Además, se debe tener en cuenta que todos los IOCTL mencionados emplean tipos de transferencia METHOD_NEITHER, lo que significa que el gestor I/= no valida ninguno de los punteros provistos ni el tamaño de los búferes. Por ello, incluso aunque el controlador verifique el tamaño de los búferes de entrada o salida, no valida si los punteros a esos búferes son realmente válidos. Por lo tanto, podemos incluir un puntero para el búfer de salida a una dirección de espacio de dirección de kernel y el código de error se escribirá allí. Se puede aprovechar esta situación para modificar la estructura SEP_TOKEN_PRIVILEGES del objeto Token que pertenece al proceso del exploit y otorgar privilegios SE_DEBUG_NAME. Esto permite que el proceso del exploit interactúe con procesos con privilegios más elevados que se ejecutan como SYSTEM, ejecutando código en su contexto de seguridad.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-08 CVE Reserved
  • 2018-07-04 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
6.00
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
6.10
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.10"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
7.00
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "7.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
5.60.3
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "5.60.3"
vs-nfd
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.00.1
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00.1"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.10
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.10"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
7.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "7.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
8.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "8.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.90.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.1"
ts
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.90.2
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.2"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.95.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.95.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1"
ts
Affected