CVE-2018-18603
low-risk
Published 2018-10-23
360 Total Security 3.5.0.1033 allows a Sandbox Escape via an "import os" statement, followed by os.system("CMD") or os.system("PowerShell"), within a .py file. NOTE: the vendor's position is that this cannot be categorized as a vulnerability, although it is a security-related issue
Do I need to act?
-
0.19% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.3/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
360 Total Security
Affected Vendors
References (3)
Third Party Advisory
https://github.com/sandboxescape/360-3.5.0.1033-Sandbox-Escape-Exploit/
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/151867
Third Party Advisory
https://github.com/sandboxescape/360-3.5.0.1033-Sandbox-Escape-Exploit/
26
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal