Local Privilege Escalation Vulnerability in Sophos SafeGuard Products
CVE-2018-6852
7.8HIGH
Key Information:
- Vendor
- Sophos
- Vendor
- CVE Published:
- 9 July 2018
Summary
Sophos SafeGuard Enterprise, SafeGuard Easy, and SafeGuard LAN Crypt are susceptible to a local privilege escalation vulnerability that can be exploited via a crafted input buffer. This vulnerability occurs through an IOCTL call (0x80202298), wherein attackers can manipulate the execution flow. By targeting the nt!memset function, they can zero out contents of a user-controlled memory address, which can lead to modification of the security descriptor in an object header of a privileged process. This gives potential for running arbitrary code in the context of a process with SYSTEM-level privileges, effectively compromising the system's security.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved