CVE-2025-34294
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wazuh | wazuh | 4.0 |
| wazuh | wazuh | 4.12 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-367 | The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a time-of-check/time-of-use (TOCTOU) race condition in Wazuh's File Integrity Monitoring (FIM) when automatic threat removal is enabled. It allows a local, low-privileged attacker to trick the Wazuh service, which runs with SYSTEM-level privileges, into deleting files or folders controlled by the attacker. The issue arises because the system does not properly synchronize or validate the final deletion target, leading to arbitrary file or folder deletion and potential local privilege escalation.
How can this vulnerability impact me? :
This vulnerability can lead to arbitrary deletion of files or folders by an attacker with low privileges, but executed with SYSTEM-level permissions. This can cause loss of important data, disruption of system operations, and potentially allow the attacker to escalate their privileges on the affected system.