CVE-2019-8606
Apple macOS kextutil Race Condition Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Mojave 10.14.5. A local user may be able to load unsigned kernel extensions.
Se presentó un problema de comprobación en el manejo de enlaces simbólicos. Este problema fue abordado con una comprobación mejorada de los enlaces simbólicos. Este problema es corregido en macOS Mojave versión 10.14.5. Un usuario local puede ser capaz de cargar extensiones del kernel sin firmar.
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the handling of kernel extensions in kextutil. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute code as the kernel.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-02-18 CVE Reserved
- 2019-05-30 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')