Wazuh's File Integrity Monitoring (FIM), when configured with automatic threat removal, contains a time-of-check/time-of-use (TOCTOU) race condition that can allow a local, low-privileged attacker to cause the Wazuh service (running as NT AUTHORITY\SYSTEM) to delete attacker-controlled files or paths. The root cause is insufficient synchronization and lack of robust final-path validation in the threat-removal workflow: the agent records an active-response action and proceeds to perform deletion without guaranteeing the deletion target is the originally intended file. This can result in SYSTEM-level arbitrary file or folder deletion and consequent local privilege escalation. Wazuh made an attempted fix via pull request 8697 on 2025-07-10, but that change was incomplete.
https://github.com/wazuh/wazuh-documentation/pull/8697
https://documentation.wazuh.com/current/user-manual/capabilities/active-response/index.html
Published: 2025-10-28
Updated: 2025-10-30
Base Score: 6.3
Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:C/A:C
Severity: Medium
Base Score: 6.3
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
Severity: Medium
Base Score: 7.1
Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H
Severity: High
EPSS: 0.00012