// For flags

CVE-2018-6857

 

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x802022E0. By crafting an input buffer we can control the execution path to the point where the constant 0x12 will be written to a user-controlled address. We can take advantage of this condition to modify the SEP_TOKEN_PRIVILEGES structure of the Token object belonging to the exploit process and grant SE_DEBUG_NAME privilege. This allows the exploit process to interact with higher privileged processes running as SYSTEM and execute code in their security context.

Sophos SafeGuard Enterprise en versiones anteriores a la 8.00.5, SafeGuard Easy en versiones anteriores a la 7.00.3, y SafeGuard LAN Crypt en versiones anteriores a la 3.95.2 son vulnerables a una escalada de privilegios local mediante IOCTL 0x802022E0. Manipulando un búfer de entrada, es posible controlar la ruta de ejecución al punto en el que la constante 0x12 se escribirá en una dirección controlada por el usuario. Se puede aprovechar esta situación para modificar la estructura SEP_TOKEN_PRIVILEGES del objeto Token que pertenece al proceso del exploit y otorgar privilegios SE_DEBUG_NAME. Esto permite que el proceso del exploit interactúe con procesos con privilegios más elevados que se ejecutan como SYSTEM, ejecutando código en su contexto de seguridad.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-08 CVE Reserved
  • 2018-07-04 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
6.00
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
6.10
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "6.10"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Easy Device Encryption Client
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client"
7.00
Search vendor "Sophos" for product "Safeguard Easy Device Encryption Client" and version "7.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
5.60.3
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "5.60.3"
vs-nfd
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.00.1
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.00.1"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
6.10
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "6.10"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
7.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "7.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Enterprise Client
Search vendor "Sophos" for product "Safeguard Enterprise Client"
8.00
Search vendor "Sophos" for product "Safeguard Enterprise Client" and version "8.00"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.90.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.1"
ts
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.90.2
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.90.2"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.95.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1"
-
Affected
Sophos
Search vendor "Sophos"
Safeguard Lan Crypt Client
Search vendor "Sophos" for product "Safeguard Lan Crypt Client"
3.95.1
Search vendor "Sophos" for product "Safeguard Lan Crypt Client" and version "3.95.1"
ts
Affected