Local Privilege Escalation Vulnerability in Sophos SafeGuard Products
CVE-2018-6852

7.8HIGH

Summary

Sophos SafeGuard Enterprise, SafeGuard Easy, and SafeGuard LAN Crypt are susceptible to a local privilege escalation vulnerability that can be exploited via a crafted input buffer. This vulnerability occurs through an IOCTL call (0x80202298), wherein attackers can manipulate the execution flow. By targeting the nt!memset function, they can zero out contents of a user-controlled memory address, which can lead to modification of the security descriptor in an object header of a privileged process. This gives potential for running arbitrary code in the context of a process with SYSTEM-level privileges, effectively compromising the system's security.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.