CVE-2018-7493

9.8 CRITICAL

📋 TL;DR

CVE-2018-7493 is a privilege escalation vulnerability in CactusVPN for macOS where the privileged helper tool's XPC interface allows arbitrary applications to execute system commands as root. This affects all macOS users running CactusVPN version 6.0 and earlier. An attacker with local access can gain complete root control of the system.

💻 Affected Systems

Products:
  • CactusVPN
Versions: through 6.0
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The privileged helper tool runs with root permissions by design.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level persistence, data theft, and lateral movement capabilities across the network.

🟠

Likely Case

Local attacker gains root privileges to install malware, steal credentials, or modify system configurations.

🟢

If Mitigated

Limited impact if system has strict application whitelisting and no local untrusted users.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to exploit.
🏢 Internal Only: HIGH - Any user with local access (including compromised accounts) can exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once local execution is achieved. The XPC interface is improperly secured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 6.0

Vendor Advisory: https://www.cactusvpn.com/

Restart Required: Yes

Instructions:

1. Uninstall CactusVPN version 6.0 or earlier. 2. Download and install the latest version from the official website. 3. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Remove CactusVPN

macOS

Uninstall vulnerable CactusVPN version to eliminate the attack surface

sudo /Library/Application\ Support/CactusVPN/uninstall.sh
sudo rm -rf /Library/Application\ Support/CactusVPN

Restrict XPC Communication

macOS

Use macOS sandboxing or third-party tools to restrict XPC communication for CactusVPN

🧯 If You Can't Patch

  • Remove CactusVPN from all affected systems immediately
  • Implement strict application control policies to prevent unauthorized local execution

🔍 How to Verify

Check if Vulnerable:

Check if CactusVPN is installed and version is 6.0 or earlier: ls /Applications/ | grep -i cactusvpn

Check Version:

Check application version in About dialog or package metadata

Verify Fix Applied:

Verify CactusVPN is either removed or updated to version above 6.0

📡 Detection & Monitoring

Log Indicators:

  • Unusual XPC communication with CactusVPN helper tool
  • Sudden privilege escalation events
  • Unexpected root process execution

Network Indicators:

  • None - this is a local privilege escalation

SIEM Query:

process_name="CactusVPN" AND parent_process="launchd" AND privilege_change="root"

🔗 References

📤 Share & Export