Skip to main content

CVE-2018-6336: Security Features (CWE-254) in Facebook osquery

High
VulnerabilityCVE-2018-6336cvecve-2018-6336cwe-254
Published: Mon Dec 31 2018 (12/31/2018, 20:00:00 UTC)
Source: CVE
Vendor/Project: Facebook
Product: osquery

Description

An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. This issue affects osquery prior to v3.2.7

AI-Powered Analysis

AILast updated: 07/03/2025, 07:56:05 UTC

Technical Analysis

CVE-2018-6336 is a high-severity vulnerability affecting Facebook's osquery software prior to version 3.2.7. Osquery is an open-source tool that enables querying of operating system data using SQL-like queries, widely used for endpoint monitoring and security analytics. The vulnerability arises from improper handling of Universal/fat binaries on macOS systems. Specifically, a maliciously crafted Universal/fat binary can evade third-party code signing verification processes. These binaries contain multiple architectures within a single file. The flaw is that third-party tools performing code signing checks do not fully inspect all architectures within the binary. As a result, the user or security tool may incorrectly assume the entire binary is signed by Apple, while malicious unsigned code embedded in one architecture slice executes undetected. This bypasses code signing protections designed to ensure only trusted, signed code runs on macOS. The vulnerability is classified under CWE-254 (Security Features), indicating a failure in security mechanisms. The CVSS 3.1 base score is 7.8 (high), with attack vector local, low attack complexity, no privileges required, user interaction required, unchanged scope, and high impact on confidentiality, integrity, and availability. Although exploitation requires local access and user interaction, the impact is severe because it allows execution of unsigned malicious code under the guise of a trusted Apple-signed binary. No known exploits in the wild have been reported. The issue was addressed in osquery version 3.2.7, which presumably includes improved binary inspection and validation to prevent this evasion technique.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially those relying on osquery for endpoint security monitoring and compliance on macOS devices. Successful exploitation allows attackers to execute unsigned malicious code while bypassing code signing protections, potentially leading to unauthorized data access, system compromise, and disruption of critical services. This undermines the integrity and trustworthiness of security monitoring tools, possibly allowing attackers to evade detection and persist on endpoints. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face increased risks of data breaches and regulatory non-compliance. Additionally, the need for local access and user interaction means insider threats or social engineering attacks could leverage this vulnerability to escalate privileges or implant persistent malware. The high confidentiality, integrity, and availability impacts highlight the potential for severe operational and reputational damage if exploited.

Mitigation Recommendations

European organizations should ensure all macOS endpoints running osquery are updated to version 3.2.7 or later, where this vulnerability is patched. Beyond patching, organizations should implement strict application whitelisting and endpoint protection controls to detect and block execution of unsigned or suspicious binaries. Security teams should audit and monitor code signing verification processes within third-party tools to confirm they fully inspect all architectures in Universal/fat binaries. User education to reduce the risk of social engineering and inadvertent execution of malicious binaries is critical. Employing macOS native security features such as System Integrity Protection (SIP) and Gatekeeper can provide additional layers of defense. Regularly reviewing and restricting local user privileges can limit the ability of attackers to exploit local vulnerabilities requiring user interaction. Finally, integrating osquery logs with centralized SIEM solutions can help detect anomalous behavior indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2018-01-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbda07d

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/3/2025, 7:56:05 AM

Last updated: 8/15/2025, 10:41:40 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats