CVE-2025-34294
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-28

Last updated on: 2025-10-30

Assigner: VulnCheck

Description
Wazuh's File Integrity Monitoring (FIM), when configured with automatic threat removal, contains a time-of-check/time-of-use (TOCTOU) race condition that can allow a local, low-privileged attacker to cause the Wazuh service (running as NT AUTHORITY\SYSTEM) to delete attacker-controlled files or paths. The root cause is insufficient synchronization and lack of robust final-path validation in the threat-removal workflow: the agent records an active-response action and proceeds to perform deletion without guaranteeing the deletion target is the originally intended file. This can result in SYSTEM-level arbitrary file or folder deletion and consequent local privilege escalation. Wazuh made an attempted fix via pull request 8697 on 2025-07-10, but that change was incomplete.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-28
Last Modified
2025-10-30
Generated
2026-05-06
AI Q&A
2025-10-28
EPSS Evaluated
2025-12-19
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wazuh wazuh 4.0
wazuh wazuh 4.12
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-367 The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a time-of-check/time-of-use (TOCTOU) race condition in Wazuh's File Integrity Monitoring (FIM) when automatic threat removal is enabled. It allows a local, low-privileged attacker to trick the Wazuh service, which runs with SYSTEM-level privileges, into deleting files or folders controlled by the attacker. The issue arises because the system does not properly synchronize or validate the final deletion target, leading to arbitrary file or folder deletion and potential local privilege escalation.


How can this vulnerability impact me? :

This vulnerability can lead to arbitrary deletion of files or folders by an attacker with low privileges, but executed with SYSTEM-level permissions. This can cause loss of important data, disruption of system operations, and potentially allow the attacker to escalate their privileges on the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart