// For flags

CVE-2018-8076

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

ZenMate 1.5.4 for macOS suffers from a type confusion vulnerability within the com.zenmate.chron-xpc LaunchDaemon component. The LaunchDaemon implements an XPC service that uses an insecure XPC API for accessing data from an inbound XPC message. This could potentially result in an XPC object of the wrong type being passed as the first argument to the xpc_connection_create_from_endpoint function if controlled by an attacker. In recent versions of macOS and OS X, Apple has implemented an internal check to prevent such XPC API abuse from occurring, thus making this vulnerability only result in a denial of service if exploited by an attacker.

ZenMate 1.5.4 para macOS sufre de una vulnerabilidad de confusión de tipos en el componente LaunchDaemon com.zenmate.chron-xpc. LaunchDaemon implementa un servicio XPC que emplea una API XPC insegura para acceder a datos de un mensaje XPC entrante. Esto podría resultar en que un objeto XPC del tipo equivocado se pase como primer argumento a la función xpc_connection_create_from_endpoint si está controlado por un atacante. En versiones recientes de macOS y OS X, Apple ha implementado una comprobación interna para evitar que ocurra el abuso de la API XPC, haciendo que esta vulnerabilidad solo resulte en una denegación de servicio (DoS), si es explotada por un atacante.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-03-12 CVE Reserved
  • 2018-03-15 CVE Published
  • 2024-01-23 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-704: Incorrect Type Conversion or Cast
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zenmate
Search vendor "Zenmate"
Zenmate
Search vendor "Zenmate" for product "Zenmate"
1.5.4
Search vendor "Zenmate" for product "Zenmate" and version "1.5.4"
macos
Affected