CVE-2018-7493
📋 TL;DR
CVE-2018-7493 is a privilege escalation vulnerability in CactusVPN for macOS where the privileged helper tool's XPC interface allows arbitrary applications to execute system commands as root. This affects all macOS users running CactusVPN version 6.0 and earlier. An attacker with local access can gain complete root control of the system.
💻 Affected Systems
- CactusVPN
📦 What is this software?
Cactusvpn by Cactusvpn
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level persistence, data theft, and lateral movement capabilities across the network.
Likely Case
Local attacker gains root privileges to install malware, steal credentials, or modify system configurations.
If Mitigated
Limited impact if system has strict application whitelisting and no local untrusted users.
🎯 Exploit Status
Exploitation requires local access but is straightforward once local execution is achieved. The XPC interface is improperly secured.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 6.0
Vendor Advisory: https://www.cactusvpn.com/
Restart Required: Yes
Instructions:
1. Uninstall CactusVPN version 6.0 or earlier. 2. Download and install the latest version from the official website. 3. Restart the system to ensure all components are updated.
🔧 Temporary Workarounds
Remove CactusVPN
macOSUninstall vulnerable CactusVPN version to eliminate the attack surface
sudo /Library/Application\ Support/CactusVPN/uninstall.sh
sudo rm -rf /Library/Application\ Support/CactusVPN
Restrict XPC Communication
macOSUse macOS sandboxing or third-party tools to restrict XPC communication for CactusVPN
🧯 If You Can't Patch
- Remove CactusVPN from all affected systems immediately
- Implement strict application control policies to prevent unauthorized local execution
🔍 How to Verify
Check if Vulnerable:
Check if CactusVPN is installed and version is 6.0 or earlier: ls /Applications/ | grep -i cactusvpn
Check Version:
Check application version in About dialog or package metadata
Verify Fix Applied:
Verify CactusVPN is either removed or updated to version above 6.0
📡 Detection & Monitoring
Log Indicators:
- Unusual XPC communication with CactusVPN helper tool
- Sudden privilege escalation events
- Unexpected root process execution
Network Indicators:
- None - this is a local privilege escalation
SIEM Query:
process_name="CactusVPN" AND parent_process="launchd" AND privilege_change="root"