Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2018-15687: There is a race condition between a stat(2) call and the fchmodat(2) call. in systemd systemd

0
High
VulnerabilityCVE-2018-15687cvecve-2018-15687
Published: Fri Oct 26 2018 (10/26/2018, 14:00:00 UTC)
Source: CVE Database V5
Vendor/Project: systemd
Product: systemd

Description

A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.

AI-Powered Analysis

AILast updated: 07/10/2025, 21:02:23 UTC

Technical Analysis

CVE-2018-15687 is a high-severity race condition vulnerability found in systemd, a widely used system and service manager for Linux operating systems. The flaw exists specifically in the chown_one() function, where a race condition occurs between the stat(2) system call and the fchmodat(2) system call. This timing issue allows an attacker with limited privileges (local user with low privileges) to manipulate systemd into setting arbitrary permissions on arbitrary files. The vulnerability affects systemd versions up to and including version 239. Exploiting this race condition can lead to unauthorized changes in file permissions, potentially allowing privilege escalation, unauthorized access, or modification of critical system files. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring local privileges and no user interaction. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to systemd's critical role in Linux system initialization and management.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those relying on Linux-based infrastructure and servers running vulnerable systemd versions. Successful exploitation could allow attackers to escalate privileges locally, modify sensitive files, or disrupt system services, leading to potential data breaches, service outages, or further compromise of internal systems. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, which often use Linux servers, could face operational disruptions and regulatory compliance issues if exploited. The impact is heightened in environments where multiple users have local access or where attackers can gain initial footholds through other means, enabling them to leverage this vulnerability for lateral movement or privilege escalation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Upgrade systemd to a patched version beyond 239 where the race condition is resolved. Since no patch links are provided here, consulting official systemd repositories or Linux distribution security advisories is essential. 2) Restrict local user access to trusted personnel only, minimizing the risk of local exploitation. 3) Employ mandatory access controls (e.g., SELinux, AppArmor) to limit the impact of unauthorized permission changes. 4) Monitor file permission changes on critical system files and directories using file integrity monitoring tools to detect suspicious activity. 5) Regularly audit and update Linux systems to ensure all components, including systemd, are current with security patches. 6) Harden user privilege management to reduce the number of users with local access and limit the use of sudo or similar privilege escalation mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
canonical
Date Reserved
2018-08-22T00:00:00.000Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68487f5d1b0bd07c3938df82

Added to database: 6/10/2025, 6:54:21 PM

Last enriched: 7/10/2025, 9:02:23 PM

Last updated: 2/3/2026, 3:11:31 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats